Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-68121 (GCVE-0-2025-68121)
Vulnerability from cvelistv5 – Published: 2026-02-05 17:48 – Updated: 2026-02-20 16:05- CWE-295 - Improper Certificate Validation
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Go standard library | crypto/tls |
Affected:
0 , < 1.24.13
(semver)
Affected: 1.25.0-0 , < 1.25.7 (semver) Affected: 1.26.0-rc.1 , < 1.26.0-rc.3 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-68121",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-20T16:05:03.924102Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295 Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-20T16:05:07.679Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "crypto/tls",
"product": "crypto/tls",
"programRoutines": [
{
"name": "Conn.handshakeContext"
},
{
"name": "Conn.Handshake"
},
{
"name": "Conn.HandshakeContext"
},
{
"name": "Conn.Read"
},
{
"name": "Conn.Write"
},
{
"name": "Dial"
},
{
"name": "DialWithDialer"
},
{
"name": "Dialer.Dial"
},
{
"name": "Dialer.DialContext"
},
{
"name": "QUICConn.Start"
}
],
"vendor": "Go standard library",
"versions": [
{
"lessThan": "1.24.13",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "1.25.7",
"status": "affected",
"version": "1.25.0-0",
"versionType": "semver"
},
{
"lessThan": "1.26.0-rc.3",
"status": "affected",
"version": "1.26.0-rc.1",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Coia Prant (github.com/rbqvq)"
},
{
"lang": "en",
"value": "Go Security Team"
}
],
"descriptions": [
{
"lang": "en",
"value": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-295: Improper Certificate Validation",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T17:48:44.141Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"url": "https://go.dev/cl/737700"
},
{
"url": "https://go.dev/issue/77217"
},
{
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"title": "Unexpected session resumption in crypto/tls"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2025-68121",
"datePublished": "2026-02-05T17:48:44.141Z",
"dateReserved": "2025-12-15T16:48:04.451Z",
"dateUpdated": "2026-02-20T16:05:07.679Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-68121\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2026-02-05T18:16:10.857\",\"lastModified\":\"2026-02-20T17:25:50.303\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.\"},{\"lang\":\"es\",\"value\":\"Durante la reanudaci\u00f3n de la sesi\u00f3n en crypto/tls, si la Config subyacente tiene sus campos ClientCAs o RootCAs mutados entre el handshake inicial y el handshake reanudado, el handshake reanudado puede tener \u00e9xito cuando deber\u00eda haber fallado. Esto puede ocurrir cuando un usuario llama a Config.Clone y muta la Config devuelta, o usa Config.GetConfigForClient. Esto puede hacer que un cliente reanude una sesi\u00f3n con un servidor con el que no la habr\u00eda reanudado durante el handshake inicial, o hacer que un servidor reanude una sesi\u00f3n con un cliente con el que no la habr\u00eda reanudado durante el handshake inicial.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.24.13\",\"matchCriteriaId\":\"9FEE539A-EDC2-4044-A38C-5A0FDF567509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.25.0\",\"versionEndExcluding\":\"1.25.7\",\"matchCriteriaId\":\"B275853C-E253-485B-B469-31D1A7383965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:1.26.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E529A0EC-B944-4E2F-B26A-2A9F31AFF240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:1.26.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"553D6D90-140E-4A54-86A3-00E66AC30F3C\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/737700\",\"source\":\"security@golang.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://go.dev/issue/77217\",\"source\":\"security@golang.org\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/K09ubi9FQFk\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2026-4337\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-68121\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-20T16:05:03.924102Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-295\", \"description\": \"CWE-295 Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-06T15:32:38.457Z\"}}], \"cna\": {\"title\": \"Unexpected session resumption in crypto/tls\", \"credits\": [{\"lang\": \"en\", \"value\": \"Coia Prant (github.com/rbqvq)\"}, {\"lang\": \"en\", \"value\": \"Go Security Team\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"crypto/tls\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.24.13\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.25.0-0\", \"lessThan\": \"1.25.7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.26.0-rc.1\", \"lessThan\": \"1.26.0-rc.3\", \"versionType\": \"semver\"}], \"packageName\": \"crypto/tls\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"Conn.handshakeContext\"}, {\"name\": \"Conn.Handshake\"}, {\"name\": \"Conn.HandshakeContext\"}, {\"name\": \"Conn.Read\"}, {\"name\": \"Conn.Write\"}, {\"name\": \"Dial\"}, {\"name\": \"DialWithDialer\"}, {\"name\": \"Dialer.Dial\"}, {\"name\": \"Dialer.DialContext\"}, {\"name\": \"QUICConn.Start\"}]}], \"references\": [{\"url\": \"https://groups.google.com/g/golang-announce/c/K09ubi9FQFk\"}, {\"url\": \"https://go.dev/cl/737700\"}, {\"url\": \"https://go.dev/issue/77217\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2026-4337\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-295: Improper Certificate Validation\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2026-02-05T17:48:44.141Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-68121\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-20T16:05:07.679Z\", \"dateReserved\": \"2025-12-15T16:48:04.451Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2026-02-05T17:48:44.141Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
cleanstart-2026-dn18334
Vulnerability from cleanstart
Security vulnerability affects the kubernetes-csi-driver-nfs-fips package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "kubernetes-csi-driver-nfs-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.13.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Security vulnerability affects the kubernetes-csi-driver-nfs-fips package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed.",
"id": "CLEANSTART-2026-DN18334",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:39:41.622120Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DN18334.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ...",
"upstream": [
"CVE-2025-68121"
]
}
cleanstart-2026-tr92727
Vulnerability from cleanstart
Multiple security vulnerabilities affect the prometheus-operator-fips package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "prometheus-operator-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.88.0-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the prometheus-operator-fips package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-TR92727",
"modified": "2026-02-12T13:07:54Z",
"published": "2026-02-13T00:41:14.875956Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-TR92727.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-f6x5-jh6r-wrfv"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/GHSA-j5w8-q4qc-rx2x"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61727"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ...",
"upstream": [
"CVE-2025-61727",
"CVE-2025-61729",
"CVE-2025-68121",
"GHSA-f6x5-jh6r-wrfv",
"GHSA-j5w8-q4qc-rx2x"
]
}
cleanstart-2026-wk32717
Vulnerability from cleanstart
Multiple security vulnerabilities affect the spark-operator package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "spark-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.4.0-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the spark-operator package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-WK32717",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:52:13.178542Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-WK32717.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58190"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ...",
"upstream": [
"CVE-2025-47911",
"CVE-2025-58190",
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121"
]
}
cleanstart-2026-uk11127
Vulnerability from cleanstart
Multiple security vulnerabilities affect the spark-operator package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "spark-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.1.1-r3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the spark-operator package. During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-UK11127",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:52:43.391940Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-UK11127.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ...",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-68121"
]
}
cleanstart-2026-rd09851
Vulnerability from cleanstart
Multiple security vulnerabilities affect the prometheus-operator package. The net/url package does not set a limit on the number of query parameters in a query. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "prometheus-operator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.87.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the prometheus-operator package. The net/url package does not set a limit on the number of query parameters in a query. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-RD09851",
"modified": "2026-02-24T09:23:19Z",
"published": "2026-02-25T00:53:44.039015Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-RD09851.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68119"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "net/url package does not set a limit on the number of query parameters in a query",
"upstream": [
"CVE-2025-61726",
"CVE-2025-61728",
"CVE-2025-61730",
"CVE-2025-61732",
"CVE-2025-68119",
"CVE-2025-68121"
]
}
RHSA-2026:3192
Vulnerability from csaf_redhat - Published: 2026-02-24 12:06 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3192",
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3192.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:40+00:00",
"generator": {
"date": "2026-03-07T19:55:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3192",
"initial_release_date": "2026-02-24T12:06:46+00:00",
"revision_history": [
{
"date": "2026-02-24T12:06:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T12:06:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_0.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_0.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el10_0.aarch64",
"product_id": "golang-0:1.25.7-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_0.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_0.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_0.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_0.aarch64",
"product_id": "golang-race-0:1.25.7-1.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_0.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_0.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el10_0.ppc64le",
"product_id": "golang-0:1.25.7-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_0.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_0.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_0.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el10_0.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_0.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_0.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el10_0.x86_64",
"product_id": "golang-0:1.25.7-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_0.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_0.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_0.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_0.x86_64",
"product_id": "golang-race-0:1.25.7-1.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_0.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_0.s390x",
"product_id": "go-toolset-0:1.25.7-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.s390x",
"product": {
"name": "golang-0:1.25.7-1.el10_0.s390x",
"product_id": "golang-0:1.25.7-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_0.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_0.s390x",
"product_id": "golang-bin-0:1.25.7-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_0.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el10_0.s390x",
"product_id": "golang-race-0:1.25.7-1.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_0.src",
"product": {
"name": "golang-0:1.25.7-1.el10_0.src",
"product_id": "golang-0:1.25.7-1.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el10_0.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el10_0.noarch",
"product_id": "golang-docs-0:1.25.7-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el10_0.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el10_0.noarch",
"product_id": "golang-misc-0:1.25.7-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el10_0.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el10_0.noarch",
"product_id": "golang-src-0:1.25.7-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el10_0.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el10_0.noarch",
"product_id": "golang-tests-0:1.25.7-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el10_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x"
},
"product_reference": "golang-0:1.25.7-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src"
},
"product_reference": "golang-0:1.25.7-1.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:06:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:06:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:06:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:06:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:go-toolset-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.src",
"AppStream-10.0.Z.E2S:golang-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-bin-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-docs-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-misc-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.aarch64",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.s390x",
"AppStream-10.0.Z.E2S:golang-race-0:1.25.7-1.el10_0.x86_64",
"AppStream-10.0.Z.E2S:golang-src-0:1.25.7-1.el10_0.noarch",
"AppStream-10.0.Z.E2S:golang-tests-0:1.25.7-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3343
Vulnerability from csaf_redhat - Published: 2026-02-25 11:50 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for skopeo is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3343",
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3343.json"
}
],
"title": "Red Hat Security Advisory: skopeo security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:44+00:00",
"generator": {
"date": "2026-03-07T19:55:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3343",
"initial_release_date": "2026-02-25T11:50:40+00:00",
"revision_history": [
{
"date": "2026-02-25T11:50:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T11:50:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.src",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.src",
"product_id": "skopeo-2:1.20.0-3.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.aarch64",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.aarch64",
"product_id": "skopeo-2:1.20.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"product_id": "skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"product_id": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el10_1?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.ppc64le",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.ppc64le",
"product_id": "skopeo-2:1.20.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"product_id": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"product_id": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el10_1?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.x86_64",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.x86_64",
"product_id": "skopeo-2:1.20.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el10_1.x86_64",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.x86_64",
"product_id": "skopeo-tests-2:1.20.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"product_id": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el10_1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el10_1.s390x",
"product": {
"name": "skopeo-2:1.20.0-3.el10_1.s390x",
"product_id": "skopeo-2:1.20.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el10_1.s390x",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.s390x",
"product_id": "skopeo-tests-2:1.20.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"product_id": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el10_1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64"
},
"product_reference": "skopeo-2:1.20.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:50:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:50:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:50:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.src",
"AppStream-10.1.Z:skopeo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debuginfo-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-debugsource-2:1.20.0-3.el10_1.x86_64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.aarch64",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.ppc64le",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.s390x",
"AppStream-10.1.Z:skopeo-tests-2:1.20.0-3.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3291
Vulnerability from csaf_redhat - Published: 2026-02-25 07:41 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for runc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3291",
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3291.json"
}
],
"title": "Red Hat Security Advisory: runc security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:40+00:00",
"generator": {
"date": "2026-03-07T19:55:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3291",
"initial_release_date": "2026-02-25T07:41:04+00:00",
"revision_history": [
{
"date": "2026-02-25T07:41:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T07:41:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.src",
"product": {
"name": "runc-4:1.4.0-2.el9_7.src",
"product_id": "runc-4:1.4.0-2.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=src\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.aarch64",
"product": {
"name": "runc-4:1.4.0-2.el9_7.aarch64",
"product_id": "runc-4:1.4.0-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"product": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"product_id": "runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.4.0-2.el9_7?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"product": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"product_id": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.4.0-2.el9_7?arch=aarch64\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.ppc64le",
"product": {
"name": "runc-4:1.4.0-2.el9_7.ppc64le",
"product_id": "runc-4:1.4.0-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"product": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"product_id": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.4.0-2.el9_7?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"product": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"product_id": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.4.0-2.el9_7?arch=ppc64le\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.x86_64",
"product": {
"name": "runc-4:1.4.0-2.el9_7.x86_64",
"product_id": "runc-4:1.4.0-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-4:1.4.0-2.el9_7.x86_64",
"product": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.x86_64",
"product_id": "runc-debugsource-4:1.4.0-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.4.0-2.el9_7?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"product": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"product_id": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.4.0-2.el9_7?arch=x86_64\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "runc-4:1.4.0-2.el9_7.s390x",
"product": {
"name": "runc-4:1.4.0-2.el9_7.s390x",
"product_id": "runc-4:1.4.0-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.4.0-2.el9_7?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-4:1.4.0-2.el9_7.s390x",
"product": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.s390x",
"product_id": "runc-debugsource-4:1.4.0-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.4.0-2.el9_7?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"product": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"product_id": "runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.4.0-2.el9_7?arch=s390x\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64"
},
"product_reference": "runc-4:1.4.0-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le"
},
"product_reference": "runc-4:1.4.0-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x"
},
"product_reference": "runc-4:1.4.0-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src"
},
"product_reference": "runc-4:1.4.0-2.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-4:1.4.0-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64"
},
"product_reference": "runc-4:1.4.0-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64"
},
"product_reference": "runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le"
},
"product_reference": "runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x"
},
"product_reference": "runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64"
},
"product_reference": "runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64"
},
"product_reference": "runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le"
},
"product_reference": "runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x"
},
"product_reference": "runc-debugsource-4:1.4.0-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-4:1.4.0-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
},
"product_reference": "runc-debugsource-4:1.4.0-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T07:41:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T07:41:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T07:41:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:runc-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debuginfo-4:1.4.0-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:runc-debugsource-4:1.4.0-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2709
Vulnerability from csaf_redhat - Published: 2026-02-16 10:32 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2709",
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2709.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:13+00:00",
"generator": {
"date": "2026-03-07T19:55:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2709",
"initial_release_date": "2026-02-16T10:32:31+00:00",
"revision_history": [
{
"date": "2026-02-16T10:32:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T10:32:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product_id": "golang-race-0:1.25.7-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product_id": "golang-race-0:1.25.7-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product_id": "go-toolset-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-bin-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_7.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el9_7.s390x",
"product_id": "golang-race-0:1.25.7-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_7.src",
"product": {
"name": "golang-0:1.25.7-1.el9_7.src",
"product_id": "golang-0:1.25.7-1.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-docs-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-misc-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-src-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el9_7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product_id": "golang-tests-0:1.25.7-1.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el9_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src"
},
"product_reference": "golang-0:1.25.7-1.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:32:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2709"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:go-toolset-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:golang-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-bin-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-docs-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-misc-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:golang-race-0:1.25.7-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:golang-src-0:1.25.7-1.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:golang-tests-0:1.25.7-1.el9_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3928
Vulnerability from csaf_redhat - Published: 2026-03-05 16:42 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for git-lfs is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3928",
"url": "https://access.redhat.com/errata/RHSA-2026:3928"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3928.json"
}
],
"title": "Red Hat Security Advisory: git-lfs security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:20+00:00",
"generator": {
"date": "2026-03-07T19:56:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3928",
"initial_release_date": "2026-03-05T16:42:20+00:00",
"revision_history": [
{
"date": "2026-03-05T16:42:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T16:42:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-7.el9_7.src",
"product": {
"name": "git-lfs-0:3.6.1-7.el9_7.src",
"product_id": "git-lfs-0:3.6.1-7.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-7.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-7.el9_7.aarch64",
"product": {
"name": "git-lfs-0:3.6.1-7.el9_7.aarch64",
"product_id": "git-lfs-0:3.6.1-7.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-7.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"product": {
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"product_id": "git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.6.1-7.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"product": {
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"product_id": "git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.6.1-7.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-7.el9_7.ppc64le",
"product": {
"name": "git-lfs-0:3.6.1-7.el9_7.ppc64le",
"product_id": "git-lfs-0:3.6.1-7.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-7.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"product": {
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"product_id": "git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.6.1-7.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"product": {
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"product_id": "git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.6.1-7.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-7.el9_7.x86_64",
"product": {
"name": "git-lfs-0:3.6.1-7.el9_7.x86_64",
"product_id": "git-lfs-0:3.6.1-7.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-7.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64",
"product": {
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64",
"product_id": "git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.6.1-7.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"product": {
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"product_id": "git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.6.1-7.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-7.el9_7.s390x",
"product": {
"name": "git-lfs-0:3.6.1-7.el9_7.s390x",
"product_id": "git-lfs-0:3.6.1-7.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-7.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"product": {
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"product_id": "git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.6.1-7.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"product": {
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"product_id": "git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.6.1-7.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-7.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64"
},
"product_reference": "git-lfs-0:3.6.1-7.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-7.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le"
},
"product_reference": "git-lfs-0:3.6.1-7.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-7.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x"
},
"product_reference": "git-lfs-0:3.6.1-7.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-7.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src"
},
"product_reference": "git-lfs-0:3.6.1-7.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-7.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64"
},
"product_reference": "git-lfs-0:3.6.1-7.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64"
},
"product_reference": "git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le"
},
"product_reference": "git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x"
},
"product_reference": "git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64"
},
"product_reference": "git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64"
},
"product_reference": "git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le"
},
"product_reference": "git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x"
},
"product_reference": "git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
},
"product_reference": "git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T16:42:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3928"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T16:42:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T16:42:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3928"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.src",
"AppStream-9.7.0.Z.MAIN:git-lfs-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debuginfo-0:3.6.1-7.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:git-lfs-debugsource-0:3.6.1-7.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3864
Vulnerability from csaf_redhat - Published: 2026-03-05 11:35 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for delve is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you\u0027re using a debugger, things aren\u0027t going your way. With that in mind, Delve should stay out of your way as much as possible.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3864",
"url": "https://access.redhat.com/errata/RHSA-2026:3864"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3864.json"
}
],
"title": "Red Hat Security Advisory: delve security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:14+00:00",
"generator": {
"date": "2026-03-07T19:56:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3864",
"initial_release_date": "2026-03-05T11:35:47+00:00",
"revision_history": [
{
"date": "2026-03-05T11:35:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T11:35:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el10_1.src",
"product": {
"name": "delve-0:1.25.2-2.el10_1.src",
"product_id": "delve-0:1.25.2-2.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el10_1.aarch64",
"product": {
"name": "delve-0:1.25.2-2.el10_1.aarch64",
"product_id": "delve-0:1.25.2-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"product_id": "delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"product_id": "delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el10_1.ppc64le",
"product": {
"name": "delve-0:1.25.2-2.el10_1.ppc64le",
"product_id": "delve-0:1.25.2-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"product_id": "delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"product_id": "delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el10_1.x86_64",
"product": {
"name": "delve-0:1.25.2-2.el10_1.x86_64",
"product_id": "delve-0:1.25.2-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el10_1.x86_64",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el10_1.x86_64",
"product_id": "delve-debugsource-0:1.25.2-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"product_id": "delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64"
},
"product_reference": "delve-0:1.25.2-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le"
},
"product_reference": "delve-0:1.25.2-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src"
},
"product_reference": "delve-0:1.25.2-2.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64"
},
"product_reference": "delve-0:1.25.2-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:35:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3864"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:35:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3864"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:35:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3864"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.src",
"AppStream-10.1.Z:delve-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debuginfo-0:1.25.2-2.el10_1.x86_64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.aarch64",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.ppc64le",
"AppStream-10.1.Z:delve-debugsource-0:1.25.2-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3874
Vulnerability from csaf_redhat - Published: 2026-03-05 11:31 - Updated: 2026-03-08 01:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.18.4 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps.\nBug Fix(es) and Enhancement(s):\n* GITOPS-8439 (CVE-2025-12816 openshift-gitops-1/console-plugin-rhel8: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications [gitops-1.18])\n* GITOPS-8870 (CVE-2025-13465 openshift-gitops-1/argocd-rhel9: prototype pollution in _.unset and _.omit functions [gitops-1.18])\n* GITOPS-8871 (CVE-2025-13465 openshift-gitops-1/console-plugin-rhel8: prototype pollution in _.unset and _.omit functions [gitops-1.18])\n* GITOPS-8986 (CVE-2025-61726 openshift-gitops-1/argo-rollouts-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.18])\n* GITOPS-8987 (CVE-2025-61726 openshift-gitops-1/argocd-agent-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.18])\n* GITOPS-8988 (CVE-2025-61726 openshift-gitops-1/argocd-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.18])\n* GITOPS-8989 (CVE-2025-61726 openshift-gitops-1/argocd-rhel9: Memory exhaustion in query parameter parsing in net/url [gitops-1.18])\n* GITOPS-8990 (CVE-2025-61726 openshift-gitops-1/dex-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.18])\n* GITOPS-8991 (CVE-2025-61726 openshift-gitops-1/gitops-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.18])\n* GITOPS-8992 (CVE-2025-61726 openshift-gitops-1/gitops-rhel8-operator: Memory exhaustion in query parameter parsing in net/url [gitops-1.18])\n* GITOPS-8324 (CVE-2025-66031 openshift-gitops-1/console-plugin-rhel8: node-forge ASN.1 Unbounded Recursion [gitops-1.17])\n* GITOPS-8488 (CVE-2025-66418 openshift-gitops-1/console-plugin-rhel8: urllib3: Unbounded decompression chain leads to resource exhaustion [gitops-1.18])\n* GITOPS-8489 (CVE-2025-66418 openshift-gitops-1/must-gather-rhel8: urllib3: Unbounded decompression chain leads to resource exhaustion [gitops-1.18])\n* GITOPS-8643 (CVE-2025-66471 openshift-gitops-1/console-plugin-rhel8: urllib3 Streaming API improperly handles highly compressed data [gitops-1.18])\n* GITOPS-9063 (CVE-2025-68121 openshift-gitops-1/dex-rhel8: Unexpected session resumption in crypto/tls [gitops-1.18])\n* GITOPS-8684 (CVE-2026-21441 openshift-gitops-1/console-plugin-rhel8: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) [gitops-1.18])",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3874",
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13465",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66031",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.18/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.18/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3874.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.4 security update",
"tracking": {
"current_release_date": "2026-03-08T01:00:17+00:00",
"generator": {
"date": "2026-03-08T01:00:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3874",
"initial_release_date": "2026-03-05T11:31:22+00:00",
"revision_history": [
{
"date": "2026-03-05T11:31:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T11:31:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-08T01:00:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.18",
"product": {
"name": "Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.18::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Aabe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439531"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439857"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Ae2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438619"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438395"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439154"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Ae82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438822"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Ac3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438555"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Ad0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439275"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Ad2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438494"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3A6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772442408"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3Ad79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438447"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Ab8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439531"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439857"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438619"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438395"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439154"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438822"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438555"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439275"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3Ae3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438494"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438447"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439531"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439857"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438619"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3Afd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438395"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439154"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438822"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438555"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439275"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438494"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438447"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439531"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439857"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438619"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438395"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439154"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438822"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438555"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Aed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772439275"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438494"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772438447"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64 as a component of Red Hat OpenShift GitOps 1.18",
"product_id": "Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:31:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-13465",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2026-01-21T20:01:28.774829+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Lodash. A prototype pollution vulnerability in the _.unset and _.omit functions allows an attacker able to control property paths to delete methods from global prototypes. By removing essential functionalities, this can result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: prototype pollution in _.unset and _.omit functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable by applications using the _.unset and _.omit functions on an object and allowing user input to determine the path of the property to be removed. This issue only allows the deletion of properties but does not allow overwriting their behavior, limiting the impact to a denial of service. Due to this reason, this vulnerability has been rated with an important severity.\n\nIn Grafana, JavaScript code runs only in the browser, while the server side is all Golang. Therefore, the worst-case scenario is a loss of functionality in the client application inside the browser. To reflect this, the CVSS availability metric and the severity of the Grafana and the Grafana-PCP component have been updated to low and moderate, respectively.\n\nThe lodash dependency is bundled and used by the pcs-web-ui component of the PCS package. In Red Hat Enterprise Linux 8.10, the pcs-web-ui component is no longer included in the PCS package. As a result, RHEL 8.10 does not ship the vulnerable lodash component within PCS and is therefore not-affected by this CVE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "RHBZ#2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
"url": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"
}
],
"release_date": "2026-01-21T19:05:28.846000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:31:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement strict input validation before passing any property paths to the _.unset and _.omit functions to block attempts to access the prototype chain. Ensure that strings like __proto__, constructor and prototype are blocked, for example.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: prototype pollution in _.unset and _.omit functions"
},
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:31:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-66031",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-11-26T23:01:36.363253+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417397"
}
],
"notes": [
{
"category": "description",
"text": "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge ASN.1 Unbounded Recursion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "RHBZ#2417397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451",
"url": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27"
}
],
"release_date": "2025-11-26T22:23:26.013000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:31:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "node-forge: node-forge ASN.1 Unbounded Recursion"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:31:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:31:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:31:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:31:22+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3874"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2353be1ea01a24c35fd63d6f033046680a815e4a1100360782b71149e48d93af_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:95fbb3c2082487b2a40bd0e9992761845cca988c262b03180bfdddeab31de919_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:abe87d778ec9473a971ad712dc464d349489cd94563c899bb24697204c506f6e_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:b8912d1100c5a5e1ca872156bc521e0aad5db03df936a1f4aa8bc7b9a7762027_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:7ea7d9fc96b14f18a1fc8c79f691a43e801c55973cec92aa08c0473ac291a957_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88aae2bc6fc9ed73e505b2bae797be5cf8b5792abf426ce08167c6792843c9b8_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:88d93d43277ea7c1b2e1b4d8d900acb74bf40c3817ba199efa37606ed724031f_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:e2f02e7115c916450ea8b906da6b575e75de8072ea032f02c05b685585aaf399_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:3d23d71c607b1243a62fb8ac2444b392e52ede2886bb1e990e48ef62bcacd5f5_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:686bdf2af69f6942481b06fc1d4deb1c839252ea3f3fdf6c4308999b5ebbf9b0_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:80a5160b09aa9c8a3cc10f68ed4a97f55ba3836c9c221a95ccf437a938afe8c0_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:fd5e9bdef07d72529f93405ba19bc9bfc3b9fd5d53cdea0a7967b2c7fde3c347_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:2f64e4d6f4ee6184d5288c0c9d4ab781c2c0c185a92bacc7ffbe24e26308d226_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7151311f01cc0d1270b59853fe69802bede2ad2c3ff0134bd92ba7fb194eabde_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:73c3db4c9fce967ac0a2004b74e4734068117a8dd597383b6def6f04c29a94d2_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:9100f8cbe10726ca76b8c624569b48c0175b882cb31e647ccd0bf5a52d57db50_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:2d36a79c3dc4ad8ae93f6c98463e7e044b24e4bd273c06f38bd026bd76abe9b5_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:52b46a27b25468652f2767a3f4fb6d84afb3023a771ed01ab7f168a576c5fe89_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:7167dca18a526637f60ebfd5901245bcc298646e41dce407bad58bceef700eb6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:9036c60a2f2f8d24a9ffe7ded0686b9c35ee1315821616c99c588a1dfb31ebef_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:67049777e7c82a5e07124c2b00508a2d343146db3126ee013faa9fbc7ea47458_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:82977f08615644a6c6ee758f2ed8a25cc7e567f2786bedb2398d48e66104ad19_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9da34d6dbf86101b9938e16b29d194b3757969a47465a094762f9e6c50b9e732_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:e82fdd38c9dbcb0c27245cd903e40622f0b3fd617c6e94959da16638d0e6c4aa_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:243a6b615a77bad0f3d3b79aa3aad5a8fca9bb464597f4931dd8bfa325dbc770_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:2fbf107528457256fd962e601c848da512e2fd5421db3b1ec477238d75c7bb43_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:c3482bc8d470b0a50e4fa5c50654516087044843c419b547a3101c45c12809c6_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ebd8e40ab8fb89f9ab4410f1c6bedfb836c576d386e549ba4c58829b9d23d89e_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:6fc4720fce99dc2d20d5d30e153c01754937dd7aca0a6697e0ecb16c16cab2ac_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:45d1247becc4902334f7a78fc532495c68e42cc6dacd94062c31187df4aa5848_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:65079b99ee9d134239a0ee944a754daf23b9516a6a1d4cd7808d4bc817b1eac6_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:d2bed1997fea827ae5237d2306da7bb31a5872b132a37100c9798dbeaf3ab260_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:e3a2a4ad4d9b619c7f9f020270b60f9b8538bd1ab55fff996f41d243317c8b62_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:0ddcb69778af5bcf176efad92ce7eac6ec89e26662b349101971353bb94f8935_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:5667832a2cd8acb5f9df8b9b8b2595eb67bd8f82b67a2975ff0e2a1be5ebf782_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:d0759f38837525062439c554da3a6219324a7fa2bf6d1458e66254a60ec883c7_amd64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed10c23b55ca3ad681b49159da9dcd502e2b2c989342184e4e94e0acde57cec4_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:01d3ffb9a0e4a416d4fdacb41346795064f8633625ce218765d02d432d91d969_s390x",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:47579ea18cc80716ca1c10c4774ce2ab70c062657faa7e24a246ed3462c8f9ab_arm64",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:7658fa7d7ffde42075b55e0373f92515a144aa328c85a4e1fd8f13de69d34f0d_ppc64le",
"Red Hat OpenShift GitOps 1.18:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:d79a8ce0b3cfc7955a7163ec2f6ab5d6b2587225f91132ab7926d261a31a61e1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:3929
Vulnerability from csaf_redhat - Published: 2026-03-05 17:28 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for git-lfs is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3929",
"url": "https://access.redhat.com/errata/RHSA-2026:3929"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3929.json"
}
],
"title": "Red Hat Security Advisory: git-lfs security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:18+00:00",
"generator": {
"date": "2026-03-07T19:56:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3929",
"initial_release_date": "2026-03-05T17:28:44+00:00",
"revision_history": [
{
"date": "2026-03-05T17:28:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T17:28:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-2.el9_6.2.src",
"product": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.src",
"product_id": "git-lfs-0:3.6.1-2.el9_6.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-2.el9_6.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"product": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"product_id": "git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-2.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"product": {
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"product_id": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.6.1-2.el9_6.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"product": {
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"product_id": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.6.1-2.el9_6.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"product": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"product_id": "git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-2.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"product": {
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"product_id": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.6.1-2.el9_6.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"product": {
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"product_id": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.6.1-2.el9_6.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"product": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"product_id": "git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-2.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64",
"product": {
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64",
"product_id": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.6.1-2.el9_6.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"product": {
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"product_id": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.6.1-2.el9_6.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-0:3.6.1-2.el9_6.2.s390x",
"product": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.s390x",
"product_id": "git-lfs-0:3.6.1-2.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs@3.6.1-2.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"product": {
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"product_id": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debugsource@3.6.1-2.el9_6.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"product": {
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"product_id": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/git-lfs-debuginfo@3.6.1-2.el9_6.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64"
},
"product_reference": "git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le"
},
"product_reference": "git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x"
},
"product_reference": "git-lfs-0:3.6.1-2.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src"
},
"product_reference": "git-lfs-0:3.6.1-2.el9_6.2.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-0:3.6.1-2.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64"
},
"product_reference": "git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64"
},
"product_reference": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le"
},
"product_reference": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x"
},
"product_reference": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64"
},
"product_reference": "git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64"
},
"product_reference": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le"
},
"product_reference": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x"
},
"product_reference": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
},
"product_reference": "git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T17:28:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3929"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T17:28:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3929"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T17:28:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3929"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.src",
"AppStream-9.6.0.Z.EUS:git-lfs-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debuginfo-0:3.6.1-2.el9_6.2.x86_64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.aarch64",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.ppc64le",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.s390x",
"AppStream-9.6.0.Z.EUS:git-lfs-debugsource-0:3.6.1-2.el9_6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3898
Vulnerability from csaf_redhat - Published: 2026-03-05 14:35 - Updated: 2026-03-07 02:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for osbuild-composer is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.\n\nSecurity Fix(es):\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3898",
"url": "https://access.redhat.com/errata/RHSA-2026:3898"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3898.json"
}
],
"title": "Red Hat Security Advisory: osbuild-composer security update",
"tracking": {
"current_release_date": "2026-03-07T02:33:43+00:00",
"generator": {
"date": "2026-03-07T02:33:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3898",
"initial_release_date": "2026-03-05T14:35:19+00:00",
"revision_history": [
{
"date": "2026-03-05T14:35:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T14:35:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T02:33:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-4.el8_10.src",
"product": {
"name": "osbuild-composer-0:101.4-4.el8_10.src",
"product_id": "osbuild-composer-0:101.4-4.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-4.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-4.el8_10.aarch64",
"product": {
"name": "osbuild-composer-0:101.4-4.el8_10.aarch64",
"product_id": "osbuild-composer-0:101.4-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"product": {
"name": "osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"product_id": "osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"product": {
"name": "osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"product_id": "osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"product_id": "osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"product_id": "osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-4.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-4.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-0:101.4-4.el8_10.ppc64le",
"product_id": "osbuild-composer-0:101.4-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"product_id": "osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"product_id": "osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"product_id": "osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"product_id": "osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-4.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-4.el8_10.x86_64",
"product": {
"name": "osbuild-composer-0:101.4-4.el8_10.x86_64",
"product_id": "osbuild-composer-0:101.4-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"product": {
"name": "osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"product_id": "osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"product": {
"name": "osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"product_id": "osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"product_id": "osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"product_id": "osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-4.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:101.4-4.el8_10.s390x",
"product": {
"name": "osbuild-composer-0:101.4-4.el8_10.s390x",
"product_id": "osbuild-composer-0:101.4-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@101.4-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:101.4-4.el8_10.s390x",
"product": {
"name": "osbuild-composer-core-0:101.4-4.el8_10.s390x",
"product_id": "osbuild-composer-core-0:101.4-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@101.4-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"product": {
"name": "osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"product_id": "osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@101.4-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"product": {
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"product_id": "osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@101.4-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"product": {
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"product_id": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@101.4-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"product": {
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"product_id": "osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@101.4-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"product_id": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@101.4-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"product_id": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@101.4-4.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.aarch64"
},
"product_reference": "osbuild-composer-0:101.4-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-0:101.4-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.s390x"
},
"product_reference": "osbuild-composer-0:101.4-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-4.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.src"
},
"product_reference": "osbuild-composer-0:101.4-4.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:101.4-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.x86_64"
},
"product_reference": "osbuild-composer-0:101.4-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.aarch64"
},
"product_reference": "osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.s390x"
},
"product_reference": "osbuild-composer-core-0:101.4-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:101.4-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.x86_64"
},
"product_reference": "osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64"
},
"product_reference": "osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.s390x"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64"
},
"product_reference": "osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.aarch64"
},
"product_reference": "osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.s390x"
},
"product_reference": "osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:101.4-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.x86_64"
},
"product_reference": "osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T14:35:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3898"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T14:35:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3898"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-core-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-debugsource-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-tests-debuginfo-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-0:101.4-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:osbuild-composer-worker-debuginfo-0:101.4-4.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3188
Vulnerability from csaf_redhat - Published: 2026-02-24 11:39 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3188",
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3188.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:37+00:00",
"generator": {
"date": "2026-03-07T19:55:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3188",
"initial_release_date": "2026-02-24T11:39:36+00:00",
"revision_history": [
{
"date": "2026-02-24T11:39:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T11:39:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.aarch64",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.aarch64",
"product_id": "grafana-0:9.2.10-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"product": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"product_id": "grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"product": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"product_id": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-28.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"product": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"product_id": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-28.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.ppc64le",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.ppc64le",
"product_id": "grafana-0:9.2.10-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"product": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"product_id": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"product": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"product_id": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-28.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"product": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"product_id": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-28.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.x86_64",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.x86_64",
"product_id": "grafana-0:9.2.10-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-28.el8_10.x86_64",
"product": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.x86_64",
"product_id": "grafana-selinux-0:9.2.10-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"product": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"product_id": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-28.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"product": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"product_id": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-28.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.s390x",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.s390x",
"product_id": "grafana-0:9.2.10-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:9.2.10-28.el8_10.s390x",
"product": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.s390x",
"product_id": "grafana-selinux-0:9.2.10-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@9.2.10-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"product": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"product_id": "grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@9.2.10-28.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"product": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"product_id": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@9.2.10-28.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:9.2.10-28.el8_10.src",
"product": {
"name": "grafana-0:9.2.10-28.el8_10.src",
"product_id": "grafana-0:9.2.10-28.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@9.2.10-28.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:9.2.10-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64"
},
"product_reference": "grafana-0:9.2.10-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64"
},
"product_reference": "grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le"
},
"product_reference": "grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x"
},
"product_reference": "grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64"
},
"product_reference": "grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64"
},
"product_reference": "grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le"
},
"product_reference": "grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x"
},
"product_reference": "grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64"
},
"product_reference": "grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64"
},
"product_reference": "grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le"
},
"product_reference": "grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x"
},
"product_reference": "grafana-selinux-0:9.2.10-28.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:9.2.10-28.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
},
"product_reference": "grafana-selinux-0:9.2.10-28.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debuginfo-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-debugsource-0:9.2.10-28.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-selinux-0:9.2.10-28.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3337
Vulnerability from csaf_redhat - Published: 2026-02-25 11:48 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for podman is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3337",
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3337.json"
}
],
"title": "Red Hat Security Advisory: podman security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:42+00:00",
"generator": {
"date": "2026-03-07T19:55:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3337",
"initial_release_date": "2026-02-25T11:48:26+00:00",
"revision_history": [
{
"date": "2026-02-25T11:48:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T11:48:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.src",
"product": {
"name": "podman-6:5.6.0-14.el9_7.src",
"product_id": "podman-6:5.6.0-14.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=src\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-plugins-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-plugins-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-remote-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-remote-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-tests-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-tests-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_id": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-14.el9_7?arch=aarch64\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-remote-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-remote-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-tests-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-tests-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_id": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-14.el9_7?arch=ppc64le\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-plugins-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-plugins-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-remote-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-remote-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-tests-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-tests-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_id": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-14.el9_7?arch=x86_64\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-plugins-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-plugins-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-remote-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-remote-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-tests-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-tests-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-debugsource-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"product": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_id": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-14.el9_7?arch=s390x\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-6:5.6.0-14.el9_7.noarch",
"product": {
"name": "podman-docker-6:5.6.0-14.el9_7.noarch",
"product_id": "podman-docker-6:5.6.0-14.el9_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@5.6.0-14.el9_7?arch=noarch\u0026epoch=6"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src"
},
"product_reference": "podman-6:5.6.0-14.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-debugsource-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-6:5.6.0-14.el9_7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch"
},
"product_reference": "podman-docker-6:5.6.0-14.el9_7.noarch",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-plugins-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-plugins-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-plugins-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-remote-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-remote-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-remote-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-remote-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-tests-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-tests-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-tests-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-tests-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64"
},
"product_reference": "podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le"
},
"product_reference": "podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x"
},
"product_reference": "podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
},
"product_reference": "podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:48:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.src",
"AppStream-9.7.0.Z.MAIN:podman-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-debugsource-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-docker-6:5.6.0-14.el9_7.noarch",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-plugins-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-remote-debuginfo-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-6:5.6.0-14.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:podman-tests-debuginfo-6:5.6.0-14.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3340
Vulnerability from csaf_redhat - Published: 2026-02-25 12:16 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for skopeo is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3340",
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3340.json"
}
],
"title": "Red Hat Security Advisory: skopeo security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:43+00:00",
"generator": {
"date": "2026-03-07T19:55:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3340",
"initial_release_date": "2026-02-25T12:16:20+00:00",
"revision_history": [
{
"date": "2026-02-25T12:16:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T12:16:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.src",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.src",
"product_id": "skopeo-2:1.20.0-3.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.aarch64",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.aarch64",
"product_id": "skopeo-2:1.20.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"product_id": "skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"product_id": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el9_7?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.ppc64le",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.ppc64le",
"product_id": "skopeo-2:1.20.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"product_id": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"product_id": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el9_7?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.x86_64",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.x86_64",
"product_id": "skopeo-2:1.20.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el9_7.x86_64",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.x86_64",
"product_id": "skopeo-tests-2:1.20.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"product_id": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el9_7?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "skopeo-2:1.20.0-3.el9_7.s390x",
"product": {
"name": "skopeo-2:1.20.0-3.el9_7.s390x",
"product_id": "skopeo-2:1.20.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.20.0-3.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.20.0-3.el9_7.s390x",
"product": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.s390x",
"product_id": "skopeo-tests-2:1.20.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.20.0-3.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"product": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"product_id": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debugsource@1.20.0-3.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"product": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"product_id": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-debuginfo@1.20.0-3.el9_7?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.20.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64"
},
"product_reference": "skopeo-2:1.20.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64"
},
"product_reference": "skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64"
},
"product_reference": "skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.20.0-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
},
"product_reference": "skopeo-tests-2:1.20.0-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:16:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:16:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:16:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:skopeo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debuginfo-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-debugsource-2:1.20.0-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:skopeo-tests-2:1.20.0-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3816
Vulnerability from csaf_redhat - Published: 2026-03-05 05:42 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3816",
"url": "https://access.redhat.com/errata/RHSA-2026:3816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3816.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:04+00:00",
"generator": {
"date": "2026-03-07T19:56:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3816",
"initial_release_date": "2026-03-05T05:42:24+00:00",
"revision_history": [
{
"date": "2026-03-05T05:42:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T05:42:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.2.2-4.el10_0.src",
"product": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.src",
"product_id": "grafana-pcp-0:5.2.2-4.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.2.2-4.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"product": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"product_id": "grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.2.2-4.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.2.2-4.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.2.2-4.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"product": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"product_id": "grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.2.2-4.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.2.2-4.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.2.2-4.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.2.2-4.el10_0.s390x",
"product": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.s390x",
"product_id": "grafana-pcp-0:5.2.2-4.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.2.2-4.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"product_id": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.2.2-4.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.2.2-4.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"product": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"product_id": "grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.2.2-4.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.2.2-4.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.2.2-4.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64"
},
"product_reference": "grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le"
},
"product_reference": "grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x"
},
"product_reference": "grafana-pcp-0:5.2.2-4.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src"
},
"product_reference": "grafana-pcp-0:5.2.2-4.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.2.2-4.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64"
},
"product_reference": "grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T05:42:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3816"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T05:42:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3816"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T05:42:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3816"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-pcp-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debuginfo-0:5.2.2-4.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-pcp-debugsource-0:5.2.2-4.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2706
Vulnerability from csaf_redhat - Published: 2026-02-16 09:40 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2706",
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2706.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:13+00:00",
"generator": {
"date": "2026-03-07T19:55:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2706",
"initial_release_date": "2026-02-16T09:40:31+00:00",
"revision_history": [
{
"date": "2026-02-16T09:40:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T09:40:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product_id": "golang-race-0:1.25.7-1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product_id": "golang-race-0:1.25.7-1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product_id": "go-toolset-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-bin-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el10_1.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el10_1.s390x",
"product_id": "golang-race-0:1.25.7-1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el10_1.src",
"product": {
"name": "golang-0:1.25.7-1.el10_1.src",
"product_id": "golang-0:1.25.7-1.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-docs-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-misc-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-src-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product_id": "golang-tests-0:1.25.7-1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src"
},
"product_reference": "golang-0:1.25.7-1.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T09:40:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:go-toolset-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.src",
"AppStream-10.1.Z:golang-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-bin-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-docs-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-misc-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.aarch64",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.ppc64le",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.s390x",
"AppStream-10.1.Z:golang-race-0:1.25.7-1.el10_1.x86_64",
"AppStream-10.1.Z:golang-src-0:1.25.7-1.el10_1.noarch",
"AppStream-10.1.Z:golang-tests-0:1.25.7-1.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3752
Vulnerability from csaf_redhat - Published: 2026-03-04 15:29 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for osbuild-composer is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3752",
"url": "https://access.redhat.com/errata/RHSA-2026:3752"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3752.json"
}
],
"title": "Red Hat Security Advisory: osbuild-composer security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:02+00:00",
"generator": {
"date": "2026-03-07T19:56:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3752",
"initial_release_date": "2026-03-04T15:29:36+00:00",
"revision_history": [
{
"date": "2026-03-04T15:29:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-04T15:29:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-5.el10_1.src",
"product": {
"name": "osbuild-composer-0:149-5.el10_1.src",
"product_id": "osbuild-composer-0:149-5.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-5.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-5.el10_1.aarch64",
"product": {
"name": "osbuild-composer-0:149-5.el10_1.aarch64",
"product_id": "osbuild-composer-0:149-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:149-5.el10_1.aarch64",
"product": {
"name": "osbuild-composer-core-0:149-5.el10_1.aarch64",
"product_id": "osbuild-composer-core-0:149-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@149-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:149-5.el10_1.aarch64",
"product": {
"name": "osbuild-composer-worker-0:149-5.el10_1.aarch64",
"product_id": "osbuild-composer-worker-0:149-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@149-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"product": {
"name": "osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"product_id": "osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@149-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"product_id": "osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@149-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"product_id": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@149-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"product_id": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@149-5.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-5.el10_1.ppc64le",
"product": {
"name": "osbuild-composer-0:149-5.el10_1.ppc64le",
"product_id": "osbuild-composer-0:149-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:149-5.el10_1.ppc64le",
"product": {
"name": "osbuild-composer-core-0:149-5.el10_1.ppc64le",
"product_id": "osbuild-composer-core-0:149-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@149-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"product": {
"name": "osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"product_id": "osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@149-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"product": {
"name": "osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"product_id": "osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@149-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"product": {
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"product_id": "osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@149-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"product_id": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@149-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"product_id": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@149-5.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-5.el10_1.s390x",
"product": {
"name": "osbuild-composer-0:149-5.el10_1.s390x",
"product_id": "osbuild-composer-0:149-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:149-5.el10_1.s390x",
"product": {
"name": "osbuild-composer-core-0:149-5.el10_1.s390x",
"product_id": "osbuild-composer-core-0:149-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@149-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:149-5.el10_1.s390x",
"product": {
"name": "osbuild-composer-worker-0:149-5.el10_1.s390x",
"product_id": "osbuild-composer-worker-0:149-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@149-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"product": {
"name": "osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"product_id": "osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@149-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"product": {
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"product_id": "osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@149-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"product_id": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@149-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"product_id": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@149-5.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-5.el10_1.x86_64",
"product": {
"name": "osbuild-composer-0:149-5.el10_1.x86_64",
"product_id": "osbuild-composer-0:149-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:149-5.el10_1.x86_64",
"product": {
"name": "osbuild-composer-core-0:149-5.el10_1.x86_64",
"product_id": "osbuild-composer-core-0:149-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@149-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:149-5.el10_1.x86_64",
"product": {
"name": "osbuild-composer-worker-0:149-5.el10_1.x86_64",
"product_id": "osbuild-composer-worker-0:149-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@149-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"product": {
"name": "osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"product_id": "osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@149-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"product_id": "osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@149-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"product_id": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@149-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64",
"product_id": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@149-5.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64"
},
"product_reference": "osbuild-composer-0:149-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le"
},
"product_reference": "osbuild-composer-0:149-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x"
},
"product_reference": "osbuild-composer-0:149-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-5.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src"
},
"product_reference": "osbuild-composer-0:149-5.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64"
},
"product_reference": "osbuild-composer-0:149-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:149-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64"
},
"product_reference": "osbuild-composer-core-0:149-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:149-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le"
},
"product_reference": "osbuild-composer-core-0:149-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:149-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x"
},
"product_reference": "osbuild-composer-core-0:149-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:149-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64"
},
"product_reference": "osbuild-composer-core-0:149-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le"
},
"product_reference": "osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x"
},
"product_reference": "osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:149-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64"
},
"product_reference": "osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:149-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le"
},
"product_reference": "osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:149-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x"
},
"product_reference": "osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:149-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64"
},
"product_reference": "osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:149-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64"
},
"product_reference": "osbuild-composer-worker-0:149-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:149-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le"
},
"product_reference": "osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:149-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x"
},
"product_reference": "osbuild-composer-worker-0:149-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:149-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64"
},
"product_reference": "osbuild-composer-worker-0:149-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:29:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3752"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:29:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3752"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:29:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3752"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:29:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3752"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.src",
"AppStream-10.1.Z:osbuild-composer-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-core-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-debugsource-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-tests-debuginfo-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-0:149-5.el10_1.x86_64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.aarch64",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.ppc64le",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.s390x",
"AppStream-10.1.Z:osbuild-composer-worker-debuginfo-0:149-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3884
Vulnerability from csaf_redhat - Published: 2026-03-05 12:07 - Updated: 2026-03-08 01:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Important: Red Hat OpenShift GitOps v1.19.2 security update",
"title": "Topic"
},
{
"category": "general",
"text": "An update is now available for Red Hat OpenShift GitOps.\nBug Fix(es) and Enhancement(s):\n* GITOPS-8874 (CVE-2025-13465 openshift-gitops-1/console-plugin-rhel8: prototype pollution in _.unset and _.omit functions [gitops-1.19])\n* GITOPS-8993 (CVE-2025-61726 openshift-gitops-1/argo-rollouts-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.19])\n* GITOPS-8994 (CVE-2025-61726 openshift-gitops-1/argocd-agent-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.19])\n* GITOPS-8995 (CVE-2025-61726 openshift-gitops-1/argocd-image-updater-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.19])\n* GITOPS-8996 (CVE-2025-61726 openshift-gitops-1/argocd-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.19])\n* GITOPS-8997 (CVE-2025-61726 openshift-gitops-1/argocd-rhel9: Memory exhaustion in query parameter parsing in net/url [gitops-1.19])\n* GITOPS-8998 (CVE-2025-61726 openshift-gitops-1/dex-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.19])\n* GITOPS-8999 (CVE-2025-61726 openshift-gitops-1/gitops-rhel8: Memory exhaustion in query parameter parsing in net/url [gitops-1.19])\n* GITOPS-8949 (CVE-2025-61728 openshift-gitops-1/argocd-image-updater-rhel8: Excessive CPU consumption when building archive index in archive/zip [gitops-1.19])\n* GITOPS-9017 (CVE-2025-61729 openshift-gitops-1/dex-rhel8: golang: Denial of Service due to excessive resource consumption via crafted certificate [gitops-1.19])\n* GITOPS-9064 (CVE-2025-68121 openshift-gitops-1/dex-rhel8: Unexpected session resumption in crypto/tls [gitops-1.19])\n* GITOPS-8685 (CVE-2026-21441 openshift-gitops-1/console-plugin-rhel8: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) [gitops-1.19])\n* GITOPS-8773 (Console plugin Applications page is broken with cannot read properties of undefined JS error)\n* GITOPS-8922 (ApplicationSet cluster scoped roles missing permissions)\n* GITOPS-9060 (Restrict ImageUpdater Scope to Local Namespace - z-stream)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3884",
"url": "https://access.redhat.com/errata/RHSA-2026:3884"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13465",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.19/",
"url": "https://docs.redhat.com/en/documentation/red_hat_openshift_gitops/1.19/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3884.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift GitOps v1.19.2 security update",
"tracking": {
"current_release_date": "2026-03-08T01:00:17+00:00",
"generator": {
"date": "2026-03-08T01:00:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3884",
"initial_release_date": "2026-03-05T12:07:11+00:00",
"revision_history": [
{
"date": "2026-03-05T12:07:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T12:07:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-08T01:00:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift GitOps 1.19",
"product": {
"name": "Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_gitops:1.19::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift GitOps"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446597"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Ae47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Acac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444686"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445412"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel8@sha256%3A2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444855"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3Aea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772448378"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3Af92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772447156"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446449"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-operator-bundle@sha256%3A00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772450268"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201?arch=amd64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445393"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446597"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444686"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3A86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445412"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel8@sha256%3Ad1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444855"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3Aaeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772448378"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772447156"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3Aed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446449"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0?arch=arm64\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445393"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3Aa4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446597"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3Ad79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3A826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444686"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3Aead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445412"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel8@sha256%3A4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444855"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3Ac4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772448378"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772447156"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3Aae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446449"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445393"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argo-rollouts-rhel8@sha256%3A5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446597"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel8@sha256%3A7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444491"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-agent-rhel8@sha256%3Af992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444686"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-extensions-rhel8@sha256%3Ad193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445412"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-image-updater-rhel8@sha256%3A733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772444855"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"product_identification_helper": {
"purl": "pkg:oci/argocd-rhel9@sha256%3A3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772448378"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/console-plugin-rhel8@sha256%3A90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772447156"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dex-rhel8@sha256%3A1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445569"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8@sha256%3A7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446341"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"product_identification_helper": {
"purl": "pkg:oci/gitops-rhel8-operator@sha256%3A55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772446449"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"product": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"product_id": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"product_identification_helper": {
"purl": "pkg:oci/must-gather-rhel8@sha256%3A65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120?arch=s390x\u0026repository_url=registry.redhat.io/openshift-gitops-1\u0026tag=1772445393"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64 as a component of Red Hat OpenShift GitOps 1.19",
"product_id": "Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
},
"product_reference": "registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64",
"relates_to_product_reference": "Red Hat OpenShift GitOps 1.19"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13465",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2026-01-21T20:01:28.774829+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Lodash. A prototype pollution vulnerability in the _.unset and _.omit functions allows an attacker able to control property paths to delete methods from global prototypes. By removing essential functionalities, this can result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: prototype pollution in _.unset and _.omit functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable by applications using the _.unset and _.omit functions on an object and allowing user input to determine the path of the property to be removed. This issue only allows the deletion of properties but does not allow overwriting their behavior, limiting the impact to a denial of service. Due to this reason, this vulnerability has been rated with an important severity.\n\nIn Grafana, JavaScript code runs only in the browser, while the server side is all Golang. Therefore, the worst-case scenario is a loss of functionality in the client application inside the browser. To reflect this, the CVSS availability metric and the severity of the Grafana and the Grafana-PCP component have been updated to low and moderate, respectively.\n\nThe lodash dependency is bundled and used by the pcs-web-ui component of the PCS package. In Red Hat Enterprise Linux 8.10, the pcs-web-ui component is no longer included in the PCS package. As a result, RHEL 8.10 does not ship the vulnerable lodash component within PCS and is therefore not-affected by this CVE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "RHBZ#2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
"url": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"
}
],
"release_date": "2026-01-21T19:05:28.846000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T12:07:11+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3884"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement strict input validation before passing any property paths to the _.unset and _.omit functions to block attempts to access the prototype chain. Ensure that strings like __proto__, constructor and prototype are blocked, for example.",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: prototype pollution in _.unset and _.omit functions"
},
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T12:07:11+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3884"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T12:07:11+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3884"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T12:07:11+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3884"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T12:07:11+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3884"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64"
],
"known_not_affected": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T12:07:11+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3884"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:138be82b54de000e765bee3b77ecedb271228e720d8195f4dd6adcf5ec4c50bc_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:2e1362c72a0d6887a940a0bdf26b6bce9eb510064700e9f095c408abbd49c9bf_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:5ffdb073886df729a401b3b11c192f6fa1cf300dc72735f59a7b087dbfbe64d1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argo-rollouts-rhel8@sha256:a4b401970e2f2392983adf4e4fdc02b5219cd007f6fab853a5e77e65b504ff14_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:62df2a36dcf0e875d62882fd22ac10df0577e6edf1593c5a2cb425287ea747d1_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:826d6f6528ded7c7d06bda756db80b65a85dccc845da6e9549f292e15bbe1e62_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:cac9de88e325bdcd774e47416349cd04d9485140ba2757789af7ece0bfdc5f10_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-agent-rhel8@sha256:f992bca52fbfa76a67b07d3cf5a7921234dbf4765d77acddc3b53c7cd6c6af4e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:86daebba4143bbc47fbe21fd201fd4724dd58a235e6880b872eabdc62d74323d_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:92123645a6195209ae1159cc3366f7d937773aa47ce4b2d95e071994e7ad5326_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:d193023a0943e711f3a4ac3fa541d2996c0e49f4fc3df380e0c3d203d9447d9c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-extensions-rhel8@sha256:ead132dfd8d85e9b2abfa332c6da9c7354b09eebcb2e3aa13f0376c6ac32562d_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:2c9c09665cdfe0d15496232eecb98d8a8a0ec415e31162113e022de9729653ab_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:4c7f4f07f63ec65cea08d79a3216d1281ab4e30116e9eba68f6196680e90ff7b_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:733cd034e950192fc651610d5d8f0e3eb0d0e8cbb6d27efbec297446854b36c1_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-image-updater-rhel8@sha256:d1e3f3cc9aae3466975e4d6e7699a5f098538df9f831492a9b49be2fec49b7a8_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:78d1ebdf50b49e4acce49cf9de00e2a0f38efa00df5e44d359eaf7fedb13cab9_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:7d86d3ca3e7973f9d03d938977fb5486c009a7a2f6a342ef806078ed04eb9946_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:d79ab12f0505b689e03a04952ddb4b8cb096a544742195443e17f040edc64778_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel8@sha256:e47bf6b1a868b557ae88ff0a284711ea5c9379bcc2bbefdcbd3ab501b4c3232d_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:3fa5c0abd247240801d6b92d01579587472a219465c229f9d73c8a2245610a70_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:aeccbbcdb0f4311c3c2f1408f6e72fbfb73273138f3fddd7f3b678e71ee7f3e7_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:c4efd2edea9a977c138a7af1fb2aa0363b9a880091332b6a0797028dd3afc3a8_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/argocd-rhel9@sha256:ea4f3f8e721945a2ca03156e50b1b76aabf2ebef72fb9db57eebf526b730f5a4_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:4e2e35b6afc23e853e907050b82f405c6d207891728ff93b466066f99f970c64_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:90a212ffbf689c1c9d0f8afaef542cf4cd9feb8da72391effef4f108b91f859c_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:9c6a85524d75533871329af0b6dfa089f443286399c375501d595b3f8a4a56e1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/console-plugin-rhel8@sha256:f92a748e4817a870c7569e23e5b932bac130e1d0d73a6a4de77f4f29e5e496cb_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:0cae9c459339fc3c6a81664cb29927be1948ac162ed2c7d03189d12fbf66b89a_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:1c28dbd5f4f8ae64c154701712918c70a52f3bbf778134bcac730ac8eb13927a_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:4c572caa0d2e8a75b3649efb4bc1d0dd00ce0d07272904de2db102713a44d8c0_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/dex-rhel8@sha256:ae393beb1e5b23747e3ace0d4bbd508a527ae03d6110dc66bd63b3a5ad30d949_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-operator-bundle@sha256:00e866aafc577f084f3bc233becd9dac15404831189a122c362112791411a796_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:36bd74ee180fa7d46ac0724f6f1d6c248f017bc69d80750665b820f6c6684a13_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:55528ebf8f834c4c75412edc02e843bb6cbfdfacfa0592f8207792e8550d4bff_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:5cd649d78637066890ba3af1963dbfb3be9b51f7f43e7a501a38e1fc1355f77b_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator@sha256:994a659056aaed2c2e07b703afbc340deeda017369b476f64a24fa4098bb40ea_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:205ce0b74260a20a4d354ca3389ebf1b652d783b3d2207e5fdf207c559277923_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:7850be031957aa5cae31c89d3e460081eeca1af89ee2c5991908e90261e1804e_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:9e0fb76618eb0da7b081c1b4d9e80e945b6f2d586dc2e010355454425d6f0904_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/gitops-rhel8@sha256:ed23c99b468e0ca372ce60af126c454e744df44d1a6251640244d7c207843dce_arm64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:1670185c7ff51b07280157424fefb192554dac53c9065f309d4b9decb2423bb1_ppc64le",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:65d6682940dac0f4f0f8153c26e9497f4e1bb3c9b57528ca2901d73df9499120_s390x",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:6657305ece826ffc36b4f6ed48fd438a72bc4366c4b88d7d4d724a495496b201_amd64",
"Red Hat OpenShift GitOps 1.19:registry.redhat.io/openshift-gitops-1/must-gather-rhel8@sha256:69a1224c7a74cf4ba40b074b3eca5aecde4d91cf11c17f87b1cb796ebfb488d0_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
}
]
}
RHSA-2026:2920
Vulnerability from csaf_redhat - Published: 2026-02-18 12:55 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2920",
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2920.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:28+00:00",
"generator": {
"date": "2026-03-07T19:55:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2920",
"initial_release_date": "2026-02-18T12:55:46+00:00",
"revision_history": [
{
"date": "2026-02-18T12:55:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T12:55:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.src",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.src",
"product_id": "grafana-0:10.2.6-18.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-21721",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"discovery_date": "2026-01-27T10:02:34.317952+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2433242"
}
],
"notes": [
{
"category": "description",
"text": "The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization\u2011internal privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21721"
},
{
"category": "external",
"summary": "RHBZ#2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/CVE-2026-21721",
"url": "https://grafana.com/security/security-advisories/CVE-2026-21721"
}
],
"release_date": "2026-01-27T09:07:55.160000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T12:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2920"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debuginfo-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-debugsource-0:10.2.6-18.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-selinux-0:10.2.6-18.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation"
}
]
}
RHSA-2026:3092
Vulnerability from csaf_redhat - Published: 2026-02-23 15:34 - Updated: 2026-03-07 02:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang-github-openprinting-ipp-usb is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables\n driverless support for USB devices capable of using IPP-over-USB protocol.\n\nSecurity Fix(es):\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3092",
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3092.json"
}
],
"title": "Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update",
"tracking": {
"current_release_date": "2026-03-07T02:33:09+00:00",
"generator": {
"date": "2026-03-07T02:33:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3092",
"initial_release_date": "2026-02-23T15:34:28+00:00",
"revision_history": [
{
"date": "2026-02-23T15:34:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T15:34:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T02:33:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"product": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"product_id": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb@0.9.27-5.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-5.el10_1.aarch64",
"product": {
"name": "ipp-usb-0:0.9.27-5.el10_1.aarch64",
"product_id": "ipp-usb-0:0.9.27-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-5.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-5.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"product": {
"name": "ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"product_id": "ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-5.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"product_id": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-5.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-5.el10_1.s390x",
"product": {
"name": "ipp-usb-0:0.9.27-5.el10_1.s390x",
"product_id": "ipp-usb-0:0.9.27-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-5.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"product_id": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-5.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ipp-usb-0:0.9.27-5.el10_1.x86_64",
"product": {
"name": "ipp-usb-0:0.9.27-5.el10_1.x86_64",
"product_id": "ipp-usb-0:0.9.27-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb@0.9.27-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"product": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"product_id": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-github-openprinting-ipp-usb-debugsource@0.9.27-5.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64",
"product": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64",
"product_id": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ipp-usb-debuginfo@0.9.27-5.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src"
},
"product_reference": "golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64"
},
"product_reference": "golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64"
},
"product_reference": "ipp-usb-0:0.9.27-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le"
},
"product_reference": "ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x"
},
"product_reference": "ipp-usb-0:0.9.27-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-0:0.9.27-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
},
"product_reference": "ipp-usb-0:0.9.27-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
},
"product_reference": "ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
],
"known_not_affected": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T15:34:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
],
"known_not_affected": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T15:34:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-0:0.9.27-5.el10_1.src",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:golang-github-openprinting-ipp-usb-debugsource-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-0:0.9.27-5.el10_1.x86_64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.aarch64",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.ppc64le",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.s390x",
"AppStream-10.1.Z:ipp-usb-debuginfo-0:0.9.27-5.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3506
Vulnerability from csaf_redhat - Published: 2026-03-02 06:45 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for yggdrasil is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child \"worker\" process, exchanging data with its worker processes through a D-Bus message broker.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3506",
"url": "https://access.redhat.com/errata/RHSA-2026:3506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3506.json"
}
],
"title": "Red Hat Security Advisory: yggdrasil security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:55+00:00",
"generator": {
"date": "2026-03-07T19:55:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3506",
"initial_release_date": "2026-03-02T06:45:32+00:00",
"revision_history": [
{
"date": "2026-03-02T06:45:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-02T06:45:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "yggdrasil-0:0.4.7-2.el10_0.src",
"product": {
"name": "yggdrasil-0:0.4.7-2.el10_0.src",
"product_id": "yggdrasil-0:0.4.7-2.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil@0.4.7-2.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "yggdrasil-0:0.4.7-2.el10_0.aarch64",
"product": {
"name": "yggdrasil-0:0.4.7-2.el10_0.aarch64",
"product_id": "yggdrasil-0:0.4.7-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil@0.4.7-2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"product": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"product_id": "yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-debugsource@0.4.7-2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"product": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"product_id": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-debuginfo@0.4.7-2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"product": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"product_id": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-examples-debuginfo@0.4.7-2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"product": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"product_id": "yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-devel@0.4.7-2.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"product": {
"name": "yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"product_id": "yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil@0.4.7-2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"product": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"product_id": "yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-debugsource@0.4.7-2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"product": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"product_id": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-debuginfo@0.4.7-2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"product": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"product_id": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-examples-debuginfo@0.4.7-2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"product": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"product_id": "yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-devel@0.4.7-2.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "yggdrasil-0:0.4.7-2.el10_0.x86_64",
"product": {
"name": "yggdrasil-0:0.4.7-2.el10_0.x86_64",
"product_id": "yggdrasil-0:0.4.7-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil@0.4.7-2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"product": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"product_id": "yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-debugsource@0.4.7-2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"product": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"product_id": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-debuginfo@0.4.7-2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"product": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"product_id": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-examples-debuginfo@0.4.7-2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"product": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"product_id": "yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-devel@0.4.7-2.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "yggdrasil-0:0.4.7-2.el10_0.s390x",
"product": {
"name": "yggdrasil-0:0.4.7-2.el10_0.s390x",
"product_id": "yggdrasil-0:0.4.7-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil@0.4.7-2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"product": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"product_id": "yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-debugsource@0.4.7-2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"product": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"product_id": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-debuginfo@0.4.7-2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"product": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"product_id": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-examples-debuginfo@0.4.7-2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"product": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"product_id": "yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/yggdrasil-devel@0.4.7-2.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.src",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-devel-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64"
},
"product_reference": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le"
},
"product_reference": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x"
},
"product_reference": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder EUS (v. 10.0)",
"product_id": "CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
},
"product_reference": "yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T06:45:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3506"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T06:45:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3506"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T06:45:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3506"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"AppStream-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"AppStream-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.src",
"CRB-10.0.Z.E2S:yggdrasil-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debuginfo-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-debugsource-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-devel-0:0.4.7-2.el10_0.x86_64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.aarch64",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.ppc64le",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.s390x",
"CRB-10.0.Z.E2S:yggdrasil-examples-debuginfo-0:0.4.7-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3298
Vulnerability from csaf_redhat - Published: 2026-02-25 09:32 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for buildah is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.\n\nSecurity Fix(es):\n\n* buildah: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\n* buildah: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* buildah: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3298",
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3298.json"
}
],
"title": "Red Hat Security Advisory: buildah security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:42+00:00",
"generator": {
"date": "2026-03-07T19:55:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3298",
"initial_release_date": "2026-02-25T09:32:15+00:00",
"revision_history": [
{
"date": "2026-02-25T09:32:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T09:32:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.src",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.src",
"product_id": "buildah-2:1.41.8-2.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-tests-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-tests-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el9_7?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el9_7?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-tests-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-tests-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el9_7?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-tests-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-tests-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el9_7?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-tests-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-tests-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-tests-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:32:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:32:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:32:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:buildah-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debuginfo-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-debugsource-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-2:1.41.8-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:buildah-tests-debuginfo-2:1.41.8-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3831
Vulnerability from csaf_redhat - Published: 2026-03-05 07:55 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3831",
"url": "https://access.redhat.com/errata/RHSA-2026:3831"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3831.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:09+00:00",
"generator": {
"date": "2026-03-07T19:56:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3831",
"initial_release_date": "2026-03-05T07:55:46+00:00",
"revision_history": [
{
"date": "2026-03-05T07:55:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T07:55:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el10_0.src",
"product": {
"name": "grafana-0:10.2.6-21.el10_0.src",
"product_id": "grafana-0:10.2.6-21.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el10_0.aarch64",
"product": {
"name": "grafana-0:10.2.6-21.el10_0.aarch64",
"product_id": "grafana-0:10.2.6-21.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"product_id": "grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-21.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-21.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-21.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el10_0.ppc64le",
"product": {
"name": "grafana-0:10.2.6-21.el10_0.ppc64le",
"product_id": "grafana-0:10.2.6-21.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-21.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-21.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-21.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el10_0.s390x",
"product": {
"name": "grafana-0:10.2.6-21.el10_0.s390x",
"product_id": "grafana-0:10.2.6-21.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-21.el10_0.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-21.el10_0.s390x",
"product_id": "grafana-selinux-0:10.2.6-21.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-21.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"product_id": "grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-21.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-21.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-21.el10_0.x86_64",
"product": {
"name": "grafana-0:10.2.6-21.el10_0.x86_64",
"product_id": "grafana-0:10.2.6-21.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-21.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-21.el10_0.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-21.el10_0.x86_64",
"product_id": "grafana-selinux-0:10.2.6-21.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-21.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-21.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-21.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64"
},
"product_reference": "grafana-0:10.2.6-21.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le"
},
"product_reference": "grafana-0:10.2.6-21.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x"
},
"product_reference": "grafana-0:10.2.6-21.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src"
},
"product_reference": "grafana-0:10.2.6-21.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-21.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64"
},
"product_reference": "grafana-0:10.2.6-21.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-21.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-21.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-21.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-21.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-21.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-21.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-21.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-21.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-21.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-21.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-21.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T07:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3831"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T07:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3831"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T07:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3831"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T07:55:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3831"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.src",
"AppStream-10.0.Z.E2S:grafana-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debuginfo-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-debugsource-0:10.2.6-21.el10_0.x86_64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.aarch64",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.s390x",
"AppStream-10.0.Z.E2S:grafana-selinux-0:10.2.6-21.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3187
Vulnerability from csaf_redhat - Published: 2026-02-24 11:39 - Updated: 2026-03-07 02:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3187",
"url": "https://access.redhat.com/errata/RHSA-2026:3187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3187.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-03-07T02:33:11+00:00",
"generator": {
"date": "2026-03-07T02:33:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3187",
"initial_release_date": "2026-02-24T11:39:51+00:00",
"revision_history": [
{
"date": "2026-02-24T11:39:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T11:39:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T02:33:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.src",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.src",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el8_10.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.s390x",
"product_id": "grafana-pcp-0:5.1.1-12.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3187"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T11:39:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3187"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:grafana-pcp-debugsource-0:5.1.1-12.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3035
Vulnerability from csaf_redhat - Published: 2026-02-23 01:30 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3035",
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3035.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:32+00:00",
"generator": {
"date": "2026-03-07T19:55:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3035",
"initial_release_date": "2026-02-23T01:30:21+00:00",
"revision_history": [
{
"date": "2026-02-23T01:30:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T01:30:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.src",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.src",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.3.0-2.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.3.0-2.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.3.0-2.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.3.0-2.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.s390x",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.s390x",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"product_id": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.3.0-2.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.3.0-2.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"product": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"product_id": "grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.3.0-2.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.3.0-2.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.3.0-2.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.3.0-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64"
},
"product_reference": "grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T01:30:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T01:30:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T01:30:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.src",
"AppStream-10.1.Z:grafana-pcp-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debuginfo-0:5.3.0-2.el10_1.x86_64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.aarch64",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.s390x",
"AppStream-10.1.Z:grafana-pcp-debugsource-0:5.3.0-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2708
Vulnerability from csaf_redhat - Published: 2026-02-16 10:08 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2708",
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2708.json"
}
],
"title": "Red Hat Security Advisory: go-toolset:rhel8 security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:13+00:00",
"generator": {
"date": "2026-03-07T19:55:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2708",
"initial_release_date": "2026-02-16T10:08:41+00:00",
"revision_history": [
{
"date": "2026-02-16T10:08:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T10:08:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=src\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product": {
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8)",
"product_id": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=noarch\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=aarch64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=ppc64le\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8)",
"product_id": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-1.module%2Bel8.10.0%2B23746%2B9db33b5e?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=x86_64\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8)",
"product_id": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.module%2Bel8.10.0%2B23993%2B83a15e10?arch=s390x\u0026rpmmod=go-toolset:rhel8:8100020260212045823:a3795dee"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8"
},
"product_reference": "delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64 (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8"
},
"product_reference": "golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch (go-toolset:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
},
"product_reference": "golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T10:08:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debuginfo-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:delve-debugsource-0:1.25.2-1.module+el8.10.0+23746+9db33b5e.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:go-toolset-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.src::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-bin-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-docs-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-misc-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.aarch64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.ppc64le::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.s390x::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-race-0:1.25.7-1.module+el8.10.0+23993+83a15e10.x86_64::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-src-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8",
"AppStream-8.10.0.Z.MAIN.EUS:golang-tests-0:1.25.7-1.module+el8.10.0+23993+83a15e10.noarch::go-toolset:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3753
Vulnerability from csaf_redhat - Published: 2026-03-04 15:52 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for osbuild-composer is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A service for building customized OS artifacts, such as VM images and OSTree commits, that uses osbuild under the hood. Besides building images for local usage, it can also upload images directly to cloud. It is compatible with composer-cli and cockpit-composer clients.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3753",
"url": "https://access.redhat.com/errata/RHSA-2026:3753"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3753.json"
}
],
"title": "Red Hat Security Advisory: osbuild-composer security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:00+00:00",
"generator": {
"date": "2026-03-07T19:56:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3753",
"initial_release_date": "2026-03-04T15:52:29+00:00",
"revision_history": [
{
"date": "2026-03-04T15:52:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-04T15:52:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-4.el9_7.src",
"product": {
"name": "osbuild-composer-0:149-4.el9_7.src",
"product_id": "osbuild-composer-0:149-4.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-4.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-4.el9_7.aarch64",
"product": {
"name": "osbuild-composer-0:149-4.el9_7.aarch64",
"product_id": "osbuild-composer-0:149-4.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-4.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:149-4.el9_7.aarch64",
"product": {
"name": "osbuild-composer-core-0:149-4.el9_7.aarch64",
"product_id": "osbuild-composer-core-0:149-4.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@149-4.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:149-4.el9_7.aarch64",
"product": {
"name": "osbuild-composer-worker-0:149-4.el9_7.aarch64",
"product_id": "osbuild-composer-worker-0:149-4.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@149-4.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"product": {
"name": "osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"product_id": "osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@149-4.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"product_id": "osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@149-4.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"product": {
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"product_id": "osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@149-4.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"product_id": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@149-4.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"product_id": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@149-4.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-4.el9_7.ppc64le",
"product": {
"name": "osbuild-composer-0:149-4.el9_7.ppc64le",
"product_id": "osbuild-composer-0:149-4.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-4.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:149-4.el9_7.ppc64le",
"product": {
"name": "osbuild-composer-core-0:149-4.el9_7.ppc64le",
"product_id": "osbuild-composer-core-0:149-4.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@149-4.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"product": {
"name": "osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"product_id": "osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@149-4.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"product": {
"name": "osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"product_id": "osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@149-4.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"product": {
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"product_id": "osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@149-4.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"product": {
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"product_id": "osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@149-4.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"product_id": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@149-4.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"product_id": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@149-4.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-4.el9_7.x86_64",
"product": {
"name": "osbuild-composer-0:149-4.el9_7.x86_64",
"product_id": "osbuild-composer-0:149-4.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-4.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:149-4.el9_7.x86_64",
"product": {
"name": "osbuild-composer-core-0:149-4.el9_7.x86_64",
"product_id": "osbuild-composer-core-0:149-4.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@149-4.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:149-4.el9_7.x86_64",
"product": {
"name": "osbuild-composer-worker-0:149-4.el9_7.x86_64",
"product_id": "osbuild-composer-worker-0:149-4.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@149-4.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"product": {
"name": "osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"product_id": "osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@149-4.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"product": {
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"product_id": "osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@149-4.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"product": {
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"product_id": "osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@149-4.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"product_id": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@149-4.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64",
"product_id": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@149-4.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "osbuild-composer-0:149-4.el9_7.s390x",
"product": {
"name": "osbuild-composer-0:149-4.el9_7.s390x",
"product_id": "osbuild-composer-0:149-4.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer@149-4.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-0:149-4.el9_7.s390x",
"product": {
"name": "osbuild-composer-core-0:149-4.el9_7.s390x",
"product_id": "osbuild-composer-core-0:149-4.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core@149-4.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-0:149-4.el9_7.s390x",
"product": {
"name": "osbuild-composer-worker-0:149-4.el9_7.s390x",
"product_id": "osbuild-composer-worker-0:149-4.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker@149-4.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"product": {
"name": "osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"product_id": "osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debugsource@149-4.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"product": {
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"product_id": "osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-core-debuginfo@149-4.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"product": {
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"product_id": "osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-debuginfo@149-4.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"product": {
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"product_id": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-tests-debuginfo@149-4.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"product": {
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"product_id": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/osbuild-composer-worker-debuginfo@149-4.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-4.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64"
},
"product_reference": "osbuild-composer-0:149-4.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-4.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le"
},
"product_reference": "osbuild-composer-0:149-4.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-4.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x"
},
"product_reference": "osbuild-composer-0:149-4.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-4.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src"
},
"product_reference": "osbuild-composer-0:149-4.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-0:149-4.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64"
},
"product_reference": "osbuild-composer-0:149-4.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:149-4.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64"
},
"product_reference": "osbuild-composer-core-0:149-4.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:149-4.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le"
},
"product_reference": "osbuild-composer-core-0:149-4.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:149-4.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x"
},
"product_reference": "osbuild-composer-core-0:149-4.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-0:149-4.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64"
},
"product_reference": "osbuild-composer-core-0:149-4.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le"
},
"product_reference": "osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x"
},
"product_reference": "osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64"
},
"product_reference": "osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64"
},
"product_reference": "osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le"
},
"product_reference": "osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x"
},
"product_reference": "osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debuginfo-0:149-4.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64"
},
"product_reference": "osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:149-4.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64"
},
"product_reference": "osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:149-4.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le"
},
"product_reference": "osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:149-4.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x"
},
"product_reference": "osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-debugsource-0:149-4.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64"
},
"product_reference": "osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64"
},
"product_reference": "osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:149-4.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64"
},
"product_reference": "osbuild-composer-worker-0:149-4.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:149-4.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le"
},
"product_reference": "osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:149-4.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x"
},
"product_reference": "osbuild-composer-worker-0:149-4.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-0:149-4.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64"
},
"product_reference": "osbuild-composer-worker-0:149-4.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
},
"product_reference": "osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:52:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3753"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:52:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3753"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:52:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-04T15:52:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3753"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.src",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-core-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-debugsource-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-tests-debuginfo-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-0:149-4.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:osbuild-composer-worker-debuginfo-0:149-4.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3341
Vulnerability from csaf_redhat - Published: 2026-02-25 12:14 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3341",
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3341.json"
}
],
"title": "Red Hat Security Advisory: containernetworking-plugins security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:43+00:00",
"generator": {
"date": "2026-03-07T19:55:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3341",
"initial_release_date": "2026-02-25T12:14:45+00:00",
"revision_history": [
{
"date": "2026-02-25T12:14:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T12:14:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.src",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.src",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"product_id": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.7.1-3.el9_7?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"product_id": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.7.1-3.el9_7?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"product_id": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.7.1-3.el9_7?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"product_id": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.7.1-3.el9_7?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64",
"product_id": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.7.1-3.el9_7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"product_id": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.7.1-3.el9_7?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"product": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"product_id": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.7.1-3.el9_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"product_id": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.7.1-3.el9_7?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"product_id": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.7.1-3.el9_7?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64"
},
"product_reference": "containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:14:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:14:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T12:14:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debuginfo-1:1.7.1-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:containernetworking-plugins-debugsource-1:1.7.1-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3843
Vulnerability from csaf_redhat - Published: 2026-03-05 09:56 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for delve is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you\u0027re using a debugger, things aren\u0027t going your way. With that in mind, Delve should stay out of your way as much as possible.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3843",
"url": "https://access.redhat.com/errata/RHSA-2026:3843"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3843.json"
}
],
"title": "Red Hat Security Advisory: delve security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:13+00:00",
"generator": {
"date": "2026-03-07T19:56:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3843",
"initial_release_date": "2026-03-05T09:56:17+00:00",
"revision_history": [
{
"date": "2026-03-05T09:56:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T09:56:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el10_0.src",
"product": {
"name": "delve-0:1.25.2-2.el10_0.src",
"product_id": "delve-0:1.25.2-2.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el10_0.aarch64",
"product": {
"name": "delve-0:1.25.2-2.el10_0.aarch64",
"product_id": "delve-0:1.25.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"product_id": "delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"product_id": "delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el10_0.ppc64le",
"product": {
"name": "delve-0:1.25.2-2.el10_0.ppc64le",
"product_id": "delve-0:1.25.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"product_id": "delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"product_id": "delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el10_0.x86_64",
"product": {
"name": "delve-0:1.25.2-2.el10_0.x86_64",
"product_id": "delve-0:1.25.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el10_0.x86_64",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el10_0.x86_64",
"product_id": "delve-debugsource-0:1.25.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"product_id": "delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64"
},
"product_reference": "delve-0:1.25.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le"
},
"product_reference": "delve-0:1.25.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el10_0.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src"
},
"product_reference": "delve-0:1.25.2-2.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64"
},
"product_reference": "delve-0:1.25.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T09:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3843"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T09:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3843"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T09:56:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3843"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.src",
"AppStream-10.0.Z.E2S:delve-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debuginfo-0:1.25.2-2.el10_0.x86_64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.aarch64",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.ppc64le",
"AppStream-10.0.Z.E2S:delve-debugsource-0:1.25.2-2.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3459
Vulnerability from csaf_redhat - Published: 2026-02-26 19:58 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 has been released",
"title": "Topic"
},
{
"category": "general",
"text": "This release of the Red Hat OpenShift distributed tracing platform (Tempo) provides new features, security improvements, and bug fixes.\n\n\nBreaking changes:\n\n* Nothing\n\n\nDeprecations:\n\n* Nothing\n\n\nTechnology Preview features:\n\n* Nothing\n\n\nEnhancements:\n\n* This release upgrades Tempo components to version 2.10.0, which improves TraceQL performance. Jira issue: https://issues.redhat.com/browse/TRACING-5944.\n\n* This update extends the `TempoStack` Custom Resource Definition (CRD) with a network policy option that enables the Operator to reconcile network policies among all components. This option is enabled by default. Jira issue: https://issues.redhat.com/browse/TRACING-5807.\n\n* This update adds support for overriding the Operator configuration by using environment variables. You can configure Operator settings through the `Subscription` custom resource of the Operator Lifecycle Manager (OLM) without modifying ConfigMaps. The `--config` flag remains available for custom configuration files if needed. Jira issue: https://issues.redhat.com/browse/TRACING-5745.\n\n* This update introduces the `size` field for `TempoStack` deployments, which provides predefined t-shirt size configurations. Instead of manually calculating CPU, memory, and storage for each component, you can select a size that matches your workload scale. The following sizes are available: `1x.demo`, `1x.pico`, `1x.extra-small`, `1x.small`, and `1x.medium`. This field is optional and existing configurations using `resources.total` or per-component overrides continue to work unchanged. Jira issue: https://issues.redhat.com/browse/TRACING-5376.\n\n* Improve TempoMonolithic memory usage. The Operator now automatically sets the `GOMEMLIMIT` soft memory limit for the Go garbage collector to 80% of the container memory limit for all Tempo components. This reduces the likelihood of out-of-memory terminations. Jira issue: https://issues.redhat.com/browse/TRACING-4554.\n\n* This update requires tenant configuration and an enabled gateway for `TempoStack` and `TempoMonolithic` instances. If you do not enable the gateway, the Operator displays a warning. For a `TempoStack` instance, enable the gateway by setting `.spec.template.gateway.enabled` to `true`. For a `TempoMonolithic` instance, the gateway is enabled automatically when any tenant is configured. `TempoStack` and `TempoMonolithic` instances without an enabled gateway are not supported. Jira ticket: https://issues.redhat.com/browse/TRACING-5750.\n\n* This release upgrades the Red Hat Universal Base Image (UBI) to version 9.\n\n\nBug fixes:\n\n* Fixed network policies for managed OpenShift services. Before this update, the Operator network policies used a hard-coded port 6443 for the API server. As a consequence, the Operator failed to connect to managed OpenShift services that expose the API on port 443. With this update, the Operator dynamically retrieves the control plane address from service endpoints. As a result, network policies work correctly on all OpenShift environments. Jira issue: https://issues.redhat.com/browse/TRACING-5974.\n\n* CVE-2025-61726: Before this update, a flaw existed in the `net/url` package in the Go standard library. As a consequence, a denial-of-service HTTP request with a massive number of query parameters could cause the application to consume an excessive amount of memory and eventually become unresponsive. This release eliminates this flaw. For more information, see https://access.redhat.com/security/cve/cve-2025-61726.\n\n* CVE-2025-61729: Before this update, the `HostnameError.Error()` function in the Go `crypto/x509` package used string concatenation in a loop without limiting the number of printed hostnames. As a consequence, processing a malicious certificate with many hostnames could cause excessive CPU and memory consumption, leading to a denial-of-service condition. This release includes the fix for this flaw. For more information, see https://access.redhat.com/security/cve/CVE-2025-61729.\n\n* CVE-2025-68121: Before this update, a flaw existed in the `crypto/tls` package in the Go standard library. As a consequence, during TLS session resumption, unauthorized clients or servers could bypass certificate validation if CA pools were mutated between handshakes. This release includes the fix for this flaw. For more information, see https://access.redhat.com/security/cve/CVE-2025-68121.\n\n\nKnown issues:\n\n* Gateway fails to forward OTLP HTTP traffic when receiver TLS is enabled. When Tempo Monolithic is configured with `multitenancy.enabled: true` and `ingestion.otlp.http.tls.enabled: true`, the gateway forwards OTLP HTTP traffic to the Tempo receiver using plain HTTP instead of HTTPS. As a consequence, the connection fails with a `connection reset by peer` error because the receiver expects TLS connections. OTLP gRPC ingestion through the gateway is not affected. Jira issue: https://issues.redhat.com/browse/TRACING-5973.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3459",
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo",
"url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/distributed_tracing/distributed-tracing-platform-tempo"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3459.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release",
"tracking": {
"current_release_date": "2026-03-07T19:55:49+00:00",
"generator": {
"date": "2026-03-07T19:55:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3459",
"initial_release_date": "2026-02-26T19:58:40+00:00",
"revision_history": [
{
"date": "2026-02-26T19:58:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-26T19:58:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.9.0",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.9::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256%3A90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771847684"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3Af406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843277"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Acd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843135"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Adc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843085"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3Adf88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843082"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3Ada4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843277"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Aa03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843135"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3Acee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843085"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843082"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3A4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843277"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Afc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843135"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3A0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843085"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3A3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843082"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel9@sha256%3A76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843440"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-jaeger-query-rhel9@sha256%3Ac90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843277"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel9@sha256%3Abfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843135"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9-operator@sha256%3Aecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843096"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel9@sha256%3A0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843085"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"product": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"product_id": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel9@sha256%3Ac665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt\u0026tag=1771843082"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64 as a component of Red Hat OpenShift distributed tracing 3.9.0",
"product_id": "Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
},
"product_reference": "registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64",
"relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.9.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T19:58:40+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T19:58:40+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
],
"known_not_affected": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T19:58:40+00:00",
"details": "For details on how to apply this update, refer to:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators",
"product_ids": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:a03e51634b01763f1f4ef7d74c1927919430d1fa1e4c37de3e1541b7dcf07b7c_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:bfce7a25f48e52508ea06d5cbfa2713ba34001108d1300fa997278b8adbd602a_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:cd55f3750867fa478f118f6f24cc34ab1778a29b3e46665408874d945df7dab9_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-opa-rhel9@sha256:fc56b8131efe2bd94900d237b8cedf72ddc917e269c9a8277852cb3eeb65aa50_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:16060709000e2eadd2a67e70c07169673d8a5dd17e2a0c3773f00f2ed70a2387_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:5d876965288712d82ad017e5838ca5b9c4fa507c8c7c14ceb404a020113d8396_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:76a0a2fba9632bd614adc12eb35df686f2502c71cfdbf699a1c3d2bb62871d29_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-gateway-rhel9@sha256:f406407af8056cdf664bc525ca91dba35cb047f57b6072c0611567b9d52639a7_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:4d8aacf31e9e78db9aa8f9722e89c1999da5033b9e6716c3853845cc3b1e06f5_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:8fd5701262304469820b1103a5aefbd5a63200bbb106cd81e1f402548812a932_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:c90c7540ee2549fa430f5fd42b7e2a6183e0027fa11514151496b56e235b610c_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-jaeger-query-rhel9@sha256:da4e907fcbb808128b23afd41d4651555dcff11db2e361adc1bfac1f231db4aa_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-operator-bundle@sha256:90d1a71febb6cac99b64fc4863bcb66b11aa18c30dad93b244aca3290c3574e0_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:0bf8e0ac0183cc9c0bb8011261945562fc848f92083770f009babf55a76d97aa_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:52f9517cb0d07549162a971c4969fe1319a2fb287135f54e1344065ef516883d_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:64493ed24c50692ef9cd6150737102d98ae120b6dba1599fdd6f13dff4c783a3_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-query-rhel9@sha256:cee195d4549093a1d9d161b243a1373368560f8bd578a57e5e2f5a2239801b99_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:0acc5e1a59997d41552c51e2be79e7f40c8b91a2ee55d7c1efc9e0cd7960de9a_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:836fe86ff3d2beeedfb4eeea334e06f971a216fe903b846a1186c2fb77024b45_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:dc6eb4ba236ba188753f3c44134e76b95b56d3f6c85a05dc298885da72c0a8dd_amd64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9-operator@sha256:ecf05fcb9614dfaab20783e9218f418497eaddd42b0d51a32a8034c52070376e_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:2c607d3ab16a5576481d060c5022a60aded5105169b44a02036fa6f37a169953_arm64",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:3012a6730ca532de4dc6d524279e9c9f04b69afeaec81c3fc2df43bfc1c888b7_ppc64le",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:c665ee88b56ebe02f4d2260262bb044647d900a17958ac9dae3932d240ceac09_s390x",
"Red Hat OpenShift distributed tracing 3.9.0:registry.redhat.io/rhosdt/tempo-rhel9@sha256:df88c2ddadcc28f76718d9965867aa4bcfb55d8b891184b54755e4d1be68ebd1_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3839
Vulnerability from csaf_redhat - Published: 2026-03-05 10:11 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for image-builder is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A local binary for building customized OS artifacts such as VM images and OSTree commits. Uses osbuild under the hood.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3839",
"url": "https://access.redhat.com/errata/RHSA-2026:3839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3839.json"
}
],
"title": "Red Hat Security Advisory: image-builder security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:11+00:00",
"generator": {
"date": "2026-03-07T19:56:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3839",
"initial_release_date": "2026-03-05T10:11:47+00:00",
"revision_history": [
{
"date": "2026-03-05T10:11:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T10:11:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-3.el9_7.aarch64",
"product": {
"name": "image-builder-0:31-3.el9_7.aarch64",
"product_id": "image-builder-0:31-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-3.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "image-builder-debugsource-0:31-3.el9_7.aarch64",
"product": {
"name": "image-builder-debugsource-0:31-3.el9_7.aarch64",
"product_id": "image-builder-debugsource-0:31-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debugsource@31-3.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "image-builder-debuginfo-0:31-3.el9_7.aarch64",
"product": {
"name": "image-builder-debuginfo-0:31-3.el9_7.aarch64",
"product_id": "image-builder-debuginfo-0:31-3.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debuginfo@31-3.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-3.el9_7.ppc64le",
"product": {
"name": "image-builder-0:31-3.el9_7.ppc64le",
"product_id": "image-builder-0:31-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-3.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "image-builder-debugsource-0:31-3.el9_7.ppc64le",
"product": {
"name": "image-builder-debugsource-0:31-3.el9_7.ppc64le",
"product_id": "image-builder-debugsource-0:31-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debugsource@31-3.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"product": {
"name": "image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"product_id": "image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debuginfo@31-3.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-3.el9_7.src",
"product": {
"name": "image-builder-0:31-3.el9_7.src",
"product_id": "image-builder-0:31-3.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-3.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-3.el9_7.x86_64",
"product": {
"name": "image-builder-0:31-3.el9_7.x86_64",
"product_id": "image-builder-0:31-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-3.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "image-builder-debugsource-0:31-3.el9_7.x86_64",
"product": {
"name": "image-builder-debugsource-0:31-3.el9_7.x86_64",
"product_id": "image-builder-debugsource-0:31-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debugsource@31-3.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "image-builder-debuginfo-0:31-3.el9_7.x86_64",
"product": {
"name": "image-builder-debuginfo-0:31-3.el9_7.x86_64",
"product_id": "image-builder-debuginfo-0:31-3.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debuginfo@31-3.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-3.el9_7.s390x",
"product": {
"name": "image-builder-0:31-3.el9_7.s390x",
"product_id": "image-builder-0:31-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-3.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "image-builder-debugsource-0:31-3.el9_7.s390x",
"product": {
"name": "image-builder-debugsource-0:31-3.el9_7.s390x",
"product_id": "image-builder-debugsource-0:31-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debugsource@31-3.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "image-builder-debuginfo-0:31-3.el9_7.s390x",
"product": {
"name": "image-builder-debuginfo-0:31-3.el9_7.s390x",
"product_id": "image-builder-debuginfo-0:31-3.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debuginfo@31-3.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64"
},
"product_reference": "image-builder-0:31-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le"
},
"product_reference": "image-builder-0:31-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x"
},
"product_reference": "image-builder-0:31-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-3.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src"
},
"product_reference": "image-builder-0:31-3.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64"
},
"product_reference": "image-builder-0:31-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debuginfo-0:31-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64"
},
"product_reference": "image-builder-debuginfo-0:31-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debuginfo-0:31-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le"
},
"product_reference": "image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debuginfo-0:31-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x"
},
"product_reference": "image-builder-debuginfo-0:31-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debuginfo-0:31-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64"
},
"product_reference": "image-builder-debuginfo-0:31-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debugsource-0:31-3.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64"
},
"product_reference": "image-builder-debugsource-0:31-3.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debugsource-0:31-3.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le"
},
"product_reference": "image-builder-debugsource-0:31-3.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debugsource-0:31-3.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x"
},
"product_reference": "image-builder-debugsource-0:31-3.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debugsource-0:31-3.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
},
"product_reference": "image-builder-debugsource-0:31-3.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T10:11:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3839"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T10:11:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3839"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T10:11:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3839"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.src",
"AppStream-9.7.0.Z.MAIN:image-builder-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debuginfo-0:31-3.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:image-builder-debugsource-0:31-3.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3040
Vulnerability from csaf_redhat - Published: 2026-02-23 02:14 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3040",
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3040.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:32+00:00",
"generator": {
"date": "2026-03-07T19:55:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3040",
"initial_release_date": "2026-02-23T02:14:35+00:00",
"revision_history": [
{
"date": "2026-02-23T02:14:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T02:14:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.src",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.src",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_7.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.s390x",
"product_id": "grafana-pcp-0:5.1.1-12.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T02:14:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T02:14:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T02:14:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.src",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debuginfo-0:5.1.1-12.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:grafana-pcp-debugsource-0:5.1.1-12.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3840
Vulnerability from csaf_redhat - Published: 2026-03-05 09:44 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for image-builder is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "A local binary for building customized OS artifacts such as VM images and OSTree commits. Uses osbuild under the hood.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3840",
"url": "https://access.redhat.com/errata/RHSA-2026:3840"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3840.json"
}
],
"title": "Red Hat Security Advisory: image-builder security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:12+00:00",
"generator": {
"date": "2026-03-07T19:56:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3840",
"initial_release_date": "2026-03-05T09:44:51+00:00",
"revision_history": [
{
"date": "2026-03-05T09:44:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T09:44:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-4.el10_1.src",
"product": {
"name": "image-builder-0:31-4.el10_1.src",
"product_id": "image-builder-0:31-4.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-4.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-4.el10_1.aarch64",
"product": {
"name": "image-builder-0:31-4.el10_1.aarch64",
"product_id": "image-builder-0:31-4.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-4.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "image-builder-debugsource-0:31-4.el10_1.aarch64",
"product": {
"name": "image-builder-debugsource-0:31-4.el10_1.aarch64",
"product_id": "image-builder-debugsource-0:31-4.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debugsource@31-4.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "image-builder-debuginfo-0:31-4.el10_1.aarch64",
"product": {
"name": "image-builder-debuginfo-0:31-4.el10_1.aarch64",
"product_id": "image-builder-debuginfo-0:31-4.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debuginfo@31-4.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-4.el10_1.ppc64le",
"product": {
"name": "image-builder-0:31-4.el10_1.ppc64le",
"product_id": "image-builder-0:31-4.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-4.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "image-builder-debugsource-0:31-4.el10_1.ppc64le",
"product": {
"name": "image-builder-debugsource-0:31-4.el10_1.ppc64le",
"product_id": "image-builder-debugsource-0:31-4.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debugsource@31-4.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"product": {
"name": "image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"product_id": "image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debuginfo@31-4.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-4.el10_1.s390x",
"product": {
"name": "image-builder-0:31-4.el10_1.s390x",
"product_id": "image-builder-0:31-4.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-4.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "image-builder-debugsource-0:31-4.el10_1.s390x",
"product": {
"name": "image-builder-debugsource-0:31-4.el10_1.s390x",
"product_id": "image-builder-debugsource-0:31-4.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debugsource@31-4.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "image-builder-debuginfo-0:31-4.el10_1.s390x",
"product": {
"name": "image-builder-debuginfo-0:31-4.el10_1.s390x",
"product_id": "image-builder-debuginfo-0:31-4.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debuginfo@31-4.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "image-builder-0:31-4.el10_1.x86_64",
"product": {
"name": "image-builder-0:31-4.el10_1.x86_64",
"product_id": "image-builder-0:31-4.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder@31-4.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "image-builder-debugsource-0:31-4.el10_1.x86_64",
"product": {
"name": "image-builder-debugsource-0:31-4.el10_1.x86_64",
"product_id": "image-builder-debugsource-0:31-4.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debugsource@31-4.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "image-builder-debuginfo-0:31-4.el10_1.x86_64",
"product": {
"name": "image-builder-debuginfo-0:31-4.el10_1.x86_64",
"product_id": "image-builder-debuginfo-0:31-4.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/image-builder-debuginfo@31-4.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-4.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64"
},
"product_reference": "image-builder-0:31-4.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-4.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le"
},
"product_reference": "image-builder-0:31-4.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-4.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x"
},
"product_reference": "image-builder-0:31-4.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-4.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-0:31-4.el10_1.src"
},
"product_reference": "image-builder-0:31-4.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-0:31-4.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64"
},
"product_reference": "image-builder-0:31-4.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debuginfo-0:31-4.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64"
},
"product_reference": "image-builder-debuginfo-0:31-4.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debuginfo-0:31-4.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le"
},
"product_reference": "image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debuginfo-0:31-4.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x"
},
"product_reference": "image-builder-debuginfo-0:31-4.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debuginfo-0:31-4.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64"
},
"product_reference": "image-builder-debuginfo-0:31-4.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debugsource-0:31-4.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64"
},
"product_reference": "image-builder-debugsource-0:31-4.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debugsource-0:31-4.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le"
},
"product_reference": "image-builder-debugsource-0:31-4.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debugsource-0:31-4.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x"
},
"product_reference": "image-builder-debugsource-0:31-4.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "image-builder-debugsource-0:31-4.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
},
"product_reference": "image-builder-debugsource-0:31-4.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T09:44:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3840"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T09:44:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3840"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T09:44:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3840"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.src",
"AppStream-10.1.Z:image-builder-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debuginfo-0:31-4.el10_1.x86_64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.aarch64",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.ppc64le",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.s390x",
"AppStream-10.1.Z:image-builder-debugsource-0:31-4.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3193
Vulnerability from csaf_redhat - Published: 2026-02-24 12:01 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for golang is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3193",
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3193.json"
}
],
"title": "Red Hat Security Advisory: golang security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:38+00:00",
"generator": {
"date": "2026-03-07T19:55:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3193",
"initial_release_date": "2026-02-24T12:01:01+00:00",
"revision_history": [
{
"date": "2026-02-24T12:01:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-24T12:01:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_6.aarch64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_6.aarch64",
"product_id": "go-toolset-0:1.25.7-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.aarch64",
"product": {
"name": "golang-0:1.25.7-1.el9_6.aarch64",
"product_id": "golang-0:1.25.7-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_6.aarch64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_6.aarch64",
"product_id": "golang-bin-0:1.25.7-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_6.aarch64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_6.aarch64",
"product_id": "golang-race-0:1.25.7-1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_6.ppc64le",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_6.ppc64le",
"product_id": "go-toolset-0:1.25.7-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.ppc64le",
"product": {
"name": "golang-0:1.25.7-1.el9_6.ppc64le",
"product_id": "golang-0:1.25.7-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_6.ppc64le",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_6.ppc64le",
"product_id": "golang-bin-0:1.25.7-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_6.ppc64le",
"product": {
"name": "golang-race-0:1.25.7-1.el9_6.ppc64le",
"product_id": "golang-race-0:1.25.7-1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_6.x86_64",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_6.x86_64",
"product_id": "go-toolset-0:1.25.7-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.x86_64",
"product": {
"name": "golang-0:1.25.7-1.el9_6.x86_64",
"product_id": "golang-0:1.25.7-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_6.x86_64",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_6.x86_64",
"product_id": "golang-bin-0:1.25.7-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_6.x86_64",
"product": {
"name": "golang-race-0:1.25.7-1.el9_6.x86_64",
"product_id": "golang-race-0:1.25.7-1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-toolset-0:1.25.7-1.el9_6.s390x",
"product": {
"name": "go-toolset-0:1.25.7-1.el9_6.s390x",
"product_id": "go-toolset-0:1.25.7-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/go-toolset@1.25.7-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.s390x",
"product": {
"name": "golang-0:1.25.7-1.el9_6.s390x",
"product_id": "golang-0:1.25.7-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-bin-0:1.25.7-1.el9_6.s390x",
"product": {
"name": "golang-bin-0:1.25.7-1.el9_6.s390x",
"product_id": "golang-bin-0:1.25.7-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-bin@1.25.7-1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "golang-race-0:1.25.7-1.el9_6.s390x",
"product": {
"name": "golang-race-0:1.25.7-1.el9_6.s390x",
"product_id": "golang-race-0:1.25.7-1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-race@1.25.7-1.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-0:1.25.7-1.el9_6.src",
"product": {
"name": "golang-0:1.25.7-1.el9_6.src",
"product_id": "golang-0:1.25.7-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang@1.25.7-1.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-docs-0:1.25.7-1.el9_6.noarch",
"product": {
"name": "golang-docs-0:1.25.7-1.el9_6.noarch",
"product_id": "golang-docs-0:1.25.7-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-docs@1.25.7-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-misc-0:1.25.7-1.el9_6.noarch",
"product": {
"name": "golang-misc-0:1.25.7-1.el9_6.noarch",
"product_id": "golang-misc-0:1.25.7-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-misc@1.25.7-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-src-0:1.25.7-1.el9_6.noarch",
"product": {
"name": "golang-src-0:1.25.7-1.el9_6.noarch",
"product_id": "golang-src-0:1.25.7-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-src@1.25.7-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "golang-tests-0:1.25.7-1.el9_6.noarch",
"product": {
"name": "golang-tests-0:1.25.7-1.el9_6.noarch",
"product_id": "golang-tests-0:1.25.7-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/golang-tests@1.25.7-1.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-toolset-0:1.25.7-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64"
},
"product_reference": "go-toolset-0:1.25.7-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64"
},
"product_reference": "golang-0:1.25.7-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le"
},
"product_reference": "golang-0:1.25.7-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x"
},
"product_reference": "golang-0:1.25.7-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src"
},
"product_reference": "golang-0:1.25.7-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-0:1.25.7-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64"
},
"product_reference": "golang-0:1.25.7-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-bin-0:1.25.7-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64"
},
"product_reference": "golang-bin-0:1.25.7-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-docs-0:1.25.7-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch"
},
"product_reference": "golang-docs-0:1.25.7-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-misc-0:1.25.7-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch"
},
"product_reference": "golang-misc-0:1.25.7-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le"
},
"product_reference": "golang-race-0:1.25.7-1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x"
},
"product_reference": "golang-race-0:1.25.7-1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-race-0:1.25.7-1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64"
},
"product_reference": "golang-race-0:1.25.7-1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-src-0:1.25.7-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch"
},
"product_reference": "golang-src-0:1.25.7-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-tests-0:1.25.7-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
},
"product_reference": "golang-tests-0:1.25.7-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:01:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:01:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:01:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-24T12:01:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:go-toolset-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.src",
"AppStream-9.6.0.Z.EUS:golang-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-bin-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-docs-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-misc-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:golang-race-0:1.25.7-1.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:golang-src-0:1.25.7-1.el9_6.noarch",
"AppStream-9.6.0.Z.EUS:golang-tests-0:1.25.7-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3559
Vulnerability from csaf_redhat - Published: 2026-03-02 17:03 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Service Mesh 2.6.14\n\nThis update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh 2.6.14, which is based on the open source Istio project, addresses a variety of problems in a microservice architecture by creating a centralized point of control in an application.\n\nSecurity Fix(es):\n* istio-operator-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\n* istio-cni-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\n* pilot-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\n* ratelimit-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\n* istio-operator-rhel8: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* istio-cni-rhel8: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* pilot-rhel8: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* ratelimit-rhel8: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* istio-operator-rhel8: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)\n\n* istio-cni-rhel8: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)\n\n* pilot-rhel8: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)\n\n* ratelimit-rhel8: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)\n\n* istio-operator-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* istio-cni-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* pilot-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* ratelimit-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* istio-operator-rhel8: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* istio-cni-rhel8: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* pilot-rhel8: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* ratelimit-rhel8: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3559",
"url": "https://access.redhat.com/errata/RHSA-2026:3559"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61731",
"url": "https://access.redhat.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61732",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61726",
"url": "https://access.redhat.com/security/cve/cve-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61728",
"url": "https://access.redhat.com/security/cve/cve-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61731",
"url": "https://access.redhat.com/security/cve/cve-2025-61731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61732",
"url": "https://access.redhat.com/security/cve/cve-2025-61732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-68121",
"url": "https://access.redhat.com/security/cve/cve-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification",
"url": "https://access.redhat.com/security/updates/classification"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3559.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14",
"tracking": {
"current_release_date": "2026-03-07T19:55:55+00:00",
"generator": {
"date": "2026-03-07T19:55:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3559",
"initial_release_date": "2026-03-02T17:03:40+00:00",
"revision_history": [
{
"date": "2026-03-02T17:03:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-02T17:03:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Service Mesh 2.6",
"product": {
"name": "Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:2.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"product_identification_helper": {
"purl": "pkg:oci/istio-operator-bundle@sha256%3A63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772089464"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/istio-cni-rhel8@sha256%3A57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992208"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel8@sha256%3A00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992528"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"product_identification_helper": {
"purl": "pkg:oci/istio-rhel8-operator@sha256%3Adcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"product_identification_helper": {
"purl": "pkg:oci/pilot-rhel8@sha256%3A3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992212"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ratelimit-rhel8@sha256%3A84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992437"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/istio-cni-rhel8@sha256%3Af0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992208"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel8@sha256%3A66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992528"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/istio-rhel8-operator@sha256%3A3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"product_identification_helper": {
"purl": "pkg:oci/pilot-rhel8@sha256%3Ae84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992212"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ratelimit-rhel8@sha256%3A5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992437"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/istio-cni-rhel8@sha256%3Ac4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992208"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel8@sha256%3A0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992528"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/istio-rhel8-operator@sha256%3Af62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/pilot-rhel8@sha256%3A5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992212"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ratelimit-rhel8@sha256%3A79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992437"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/istio-cni-rhel8@sha256%3Aee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992208"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel8@sha256%3Aed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992528"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"product_identification_helper": {
"purl": "pkg:oci/istio-rhel8-operator@sha256%3A9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"product_identification_helper": {
"purl": "pkg:oci/pilot-rhel8@sha256%3A8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992212"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ratelimit-rhel8@sha256%3A1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771992437"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T17:03:40+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3559"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T17:03:40+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3559"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61731",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2026-01-28T20:01:45.587773+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434433"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cmd/go. An attacker can exploit this by building a malicious Go source file that uses the \u0027#cgo pkg-config:\u0027 directive. This allows the attacker to write to an arbitrary file with partial control over its content, by providing a \u0027--log-file\u0027 argument to the pkg-config command. This vulnerability can lead to arbitrary file write.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is Important rather than Moderate because compiling a malicious Go source file can cause `pkg-config` to create or append data to files at attacker-chosen locations, subject to the permissions of the build user. This can enable unintended filesystem modifications during the build process, which can lead to broken builds, alter tool behavior, and poison caches or artifacts, even without direct code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "RHBZ#2434433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434433"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61731",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61731"
},
{
"category": "external",
"summary": "https://go.dev/cl/736711",
"url": "https://go.dev/cl/736711"
},
{
"category": "external",
"summary": "https://go.dev/issue/77100",
"url": "https://go.dev/issue/77100"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4339",
"url": "https://pkg.go.dev/vuln/GO-2026-4339"
}
],
"release_date": "2026-01-28T19:30:30.844000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T17:03:40+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3559"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T17:03:40+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3559"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T17:03:40+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3559"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:00b06379319a10eab80e4287dfb4ca280bcdc225857eda09aab019912df266cc_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:0c6a12c583d7dd62540e4ecc34a805e8ae69bd3e0db36d665440abb87dd90b6f_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:66c71452d031ef9b5b99b6ee124babfed74ed9ef8697a07e237e4d67a1dc197f_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/grafana-rhel8@sha256:ed1bd8e74eb84fe2cb11227bf4483244d48b9e396ba209b2682bbf297ddacce3_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:57bfa19df7cd8c94c9a1887195fa14583ec95607c65ab1a37ed36e515bf015d6_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:c4d28d0365c81b302827338e517aa7b97e4e234f3e2b611035316162c2eed77c_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:ee2fe46057b423f7352037f0203357a3d7d2ccbcb87d51cdab200121d4315bb7_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-cni-rhel8@sha256:f0b58a20ccb618c10f3bb362d6864f32d745706e351a987542c53105a88378f4_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-operator-bundle@sha256:63ac3cee1a38f321dbdcb26e9b8bc4300bfe76bc38cb636004b91623c75aff86_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:3462c8c5f48bce1a0b67fb91b9ec2addf658351ad2d0b2a83b508c62de326b9a_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:9920d110f9e91ac94bb68329ade74f6ff4cb12bc836cf26c3784a128e5740b23_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:dcbb2fdf5a578754156453c39006056aa42b22ec3a91b47a196939f5371d2884_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-rhel8-operator@sha256:f62c529feebed0564ff70d317058d08bfb48429d997c941f89c9abd4b41cb040_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:3b963918db39c3a29370452c4d2412a5590ebc0b0ed05528c6c1749550f16883_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:5b86898fbbd6d700a925c55b3f25b0c965e34f41a6af6cbb197107ff19f8056d_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:8c2943d00fde9270625caee1e36e6b49e0880352ecaa39a35bad7f2955801615_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/pilot-rhel8@sha256:e84615cc4becd27ace58a15c20c791cdff22d3e4ce267c73606bdcb36ff99f79_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:1f004a30a398677b3f7293ffe4afbf0a172179ab18336b3176fe70f4c8a1f77b_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:5024ef5bf24b002920ef504f7dd81cc1f6a92bf9e99769ff9d6d7a2390ee69fb_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:79176bc3c4edbe030c867a9e68cf86fdd98ba645a85faaa18e39b313530c3456_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/ratelimit-rhel8@sha256:84cac542d17180bc2103b553b8aa695668e9593d8f3c120ac6cf84af3843be2e_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3817
Vulnerability from csaf_redhat - Published: 2026-03-05 06:25 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana-pcp is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3817",
"url": "https://access.redhat.com/errata/RHSA-2026:3817"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3817.json"
}
],
"title": "Red Hat Security Advisory: grafana-pcp security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:04+00:00",
"generator": {
"date": "2026-03-07T19:56:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3817",
"initial_release_date": "2026-03-05T06:25:53+00:00",
"revision_history": [
{
"date": "2026-03-05T06:25:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T06:25:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_6.src",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.src",
"product_id": "grafana-pcp-0:5.1.1-12.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"product_id": "grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"product_id": "grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"product_id": "grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-pcp-0:5.1.1-12.el9_6.s390x",
"product": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.s390x",
"product_id": "grafana-pcp-0:5.1.1-12.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp@5.1.1-12.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"product": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"product_id": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debugsource@5.1.1-12.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"product": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"product_id": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-pcp-debuginfo@5.1.1-12.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-0:5.1.1-12.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64"
},
"product_reference": "grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64"
},
"product_reference": "grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
},
"product_reference": "grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T06:25:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3817"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T06:25:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3817"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T06:25:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3817"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-pcp-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debuginfo-0:5.1.1-12.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-pcp-debugsource-0:5.1.1-12.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:2914
Vulnerability from csaf_redhat - Published: 2026-02-18 11:31 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2914",
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2914.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:26+00:00",
"generator": {
"date": "2026-03-07T19:55:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:2914",
"initial_release_date": "2026-02-18T11:31:17+00:00",
"revision_history": [
{
"date": "2026-02-18T11:31:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-18T11:31:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.src",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.src",
"product_id": "grafana-0:10.2.6-22.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-22.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-22.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-22.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-22.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
},
{
"cve": "CVE-2026-21721",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"discovery_date": "2026-01-27T10:02:34.317952+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2433242"
}
],
"notes": [
{
"category": "description",
"text": "The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization\u2011internal privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21721"
},
{
"category": "external",
"summary": "RHBZ#2433242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2433242"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21721"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21721"
},
{
"category": "external",
"summary": "https://grafana.com/security/security-advisories/CVE-2026-21721",
"url": "https://grafana.com/security/security-advisories/CVE-2026-21721"
}
],
"release_date": "2026-01-27T09:07:55.160000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-18T11:31:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2914"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.src",
"AppStream-10.1.Z:grafana-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debuginfo-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-debugsource-0:10.2.6-22.el10_1.x86_64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.aarch64",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.ppc64le",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.s390x",
"AppStream-10.1.Z:grafana-selinux-0:10.2.6-22.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross\u2011Dashboard Privilege Escalation"
}
]
}
RHSA-2026:3089
Vulnerability from csaf_redhat - Published: 2026-02-23 14:46 - Updated: 2026-03-07 02:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Developer Hub 1.8.4 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Developer Hub (RHDH) is Red Hat\u0027s enterprise-grade, self-managed, customizable developer portal based on Backstage.io. RHDH is supported on OpenShift and other major Kubernetes clusters (AKS, EKS, GKE). The core features of RHDH include a single pane of glass, a centralized software catalog, self-service via golden path templates, and Tech Docs. RHDH is extensible by plugins.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3089",
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh",
"url": "https://catalog.redhat.com/search?gs\u0026searchType=containers\u0026q=rhdh"
},
{
"category": "external",
"summary": "https://developers.redhat.com/rhdh/overview",
"url": "https://developers.redhat.com/rhdh/overview"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_developer_hub",
"url": "https://docs.redhat.com/en/documentation/red_hat_developer_hub"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-11792",
"url": "https://issues.redhat.com/browse/RHIDP-11792"
},
{
"category": "external",
"summary": "https://issues.redhat.com/browse/RHIDP-12149",
"url": "https://issues.redhat.com/browse/RHIDP-12149"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3089.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Developer Hub 1.8.4 release.",
"tracking": {
"current_release_date": "2026-03-07T02:33:08+00:00",
"generator": {
"date": "2026-03-07T02:33:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3089",
"initial_release_date": "2026-02-23T14:46:08+00:00",
"revision_history": [
{
"date": "2026-02-23T14:46:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-23T14:46:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T02:33:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Developer Hub 1.8",
"product": {
"name": "Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhdh:1.8::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Developer Hub"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-hub-rhel9@sha256%3A66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1771455166"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-rhel9-operator@sha256%3A6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1771440517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"product": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"product_id": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhdh-operator-bundle@sha256%3Aa375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b?arch=amd64\u0026repository_url=registry.redhat.io/rhdh\u0026tag=1771459285"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64 as a component of Red Hat Developer Hub 1.8",
"product_id": "Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
},
"product_reference": "registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64",
"relates_to_product_reference": "Red Hat Developer Hub 1.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T14:46:08+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
],
"known_not_affected": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-23T14:46:08+00:00",
"details": "For more about Red Hat Developer Hub, see References links",
"product_ids": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-hub-rhel9@sha256:66396a9445845a4437304aa5b7c441d90cd1494361d60b2165895f7cf9e2016f_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-operator-bundle@sha256:a375ee40f1921cbf9dd534820f8ff4efa9b7675992aa2a1361bd8ec24913b42b_amd64",
"Red Hat Developer Hub 1.8:registry.redhat.io/rhdh/rhdh-rhel9-operator@sha256:6e76191bf1d5afa5ee76330bf6c8860889e0d10661e4633dbb50254ebacfccd9_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3556
Vulnerability from csaf_redhat - Published: 2026-03-02 16:52 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Service Mesh 2.6.14\n\nThis update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh 2.6.14, which is based on the open source Istio project, addresses a variety of problems in a microservice architecture by creating a centralized point of control in an application.\n\nSecurity Fix(es):\n\n* proxyv2-rhel9: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\n* proxyv2-rhel9: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* proxyv2-rhel9: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)\n\n* proxyv2-rhel9: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* proxyv2-rhel9: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3556",
"url": "https://access.redhat.com/errata/RHSA-2026:3556"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61731",
"url": "https://access.redhat.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61732",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61726",
"url": "https://access.redhat.com/security/cve/cve-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61728",
"url": "https://access.redhat.com/security/cve/cve-2025-61728"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61731",
"url": "https://access.redhat.com/security/cve/cve-2025-61731"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-61732",
"url": "https://access.redhat.com/security/cve/cve-2025-61732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/cve-2025-68121",
"url": "https://access.redhat.com/security/cve/cve-2025-68121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification",
"url": "https://access.redhat.com/security/updates/classification"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3556.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14",
"tracking": {
"current_release_date": "2026-03-07T19:55:55+00:00",
"generator": {
"date": "2026-03-07T19:55:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3556",
"initial_release_date": "2026-03-02T16:52:33+00:00",
"revision_history": [
{
"date": "2026-03-02T16:52:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-02T16:53:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Service Mesh 2.6",
"product": {
"name": "Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:2.6::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"product_identification_helper": {
"purl": "pkg:oci/istio-must-gather-rhel9@sha256%3A53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771958430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64",
"product_id": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/proxyv2-rhel9@sha256%3Af49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772083861"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"product_identification_helper": {
"purl": "pkg:oci/istio-must-gather-rhel9@sha256%3A25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771958430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"product_id": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/proxyv2-rhel9@sha256%3Aefd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772083861"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/istio-must-gather-rhel9@sha256%3Aa168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771958430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"product_id": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/proxyv2-rhel9@sha256%3A14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772083861"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/istio-must-gather-rhel9@sha256%3A94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771958430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"product": {
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"product_id": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"product_identification_helper": {
"purl": "pkg:oci/proxyv2-rhel9@sha256%3A47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772083861"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
"product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
},
"product_reference": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64",
"relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T16:52:33+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3556"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T16:52:33+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3556"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61731",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2026-01-28T20:01:45.587773+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434433"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in cmd/go. An attacker can exploit this by building a malicious Go source file that uses the \u0027#cgo pkg-config:\u0027 directive. This allows the attacker to write to an arbitrary file with partial control over its content, by providing a \u0027--log-file\u0027 argument to the pkg-config command. This vulnerability can lead to arbitrary file write.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is Important rather than Moderate because compiling a malicious Go source file can cause `pkg-config` to create or append data to files at attacker-chosen locations, subject to the permissions of the build user. This can enable unintended filesystem modifications during the build process, which can lead to broken builds, alter tool behavior, and poison caches or artifacts, even without direct code execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "RHBZ#2434433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434433"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61731",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61731"
},
{
"category": "external",
"summary": "https://go.dev/cl/736711",
"url": "https://go.dev/cl/736711"
},
{
"category": "external",
"summary": "https://go.dev/issue/77100",
"url": "https://go.dev/issue/77100"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4339",
"url": "https://pkg.go.dev/vuln/GO-2026-4339"
}
],
"release_date": "2026-01-28T19:30:30.844000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T16:52:33+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3556"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T16:52:33+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3556"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-02T16:52:33+00:00",
"details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
"product_ids": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3556"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
"Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3833
Vulnerability from csaf_redhat - Published: 2026-03-05 08:23 - Updated: 2026-03-07 19:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for grafana is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3833",
"url": "https://access.redhat.com/errata/RHSA-2026:3833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3833.json"
}
],
"title": "Red Hat Security Advisory: grafana security update",
"tracking": {
"current_release_date": "2026-03-07T19:56:09+00:00",
"generator": {
"date": "2026-03-07T19:56:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3833",
"initial_release_date": "2026-03-05T08:23:57+00:00",
"revision_history": [
{
"date": "2026-03-05T08:23:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T08:23:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:56:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_6.src",
"product": {
"name": "grafana-0:10.2.6-18.el9_6.src",
"product_id": "grafana-0:10.2.6-18.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_6.aarch64",
"product": {
"name": "grafana-0:10.2.6-18.el9_6.aarch64",
"product_id": "grafana-0:10.2.6-18.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"product_id": "grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_6.ppc64le",
"product": {
"name": "grafana-0:10.2.6-18.el9_6.ppc64le",
"product_id": "grafana-0:10.2.6-18.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"product_id": "grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_6.x86_64",
"product": {
"name": "grafana-0:10.2.6-18.el9_6.x86_64",
"product_id": "grafana-0:10.2.6-18.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_6.x86_64",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_6.x86_64",
"product_id": "grafana-selinux-0:10.2.6-18.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-0:10.2.6-18.el9_6.s390x",
"product": {
"name": "grafana-0:10.2.6-18.el9_6.s390x",
"product_id": "grafana-0:10.2.6-18.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana@10.2.6-18.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-selinux-0:10.2.6-18.el9_6.s390x",
"product": {
"name": "grafana-selinux-0:10.2.6-18.el9_6.s390x",
"product_id": "grafana-selinux-0:10.2.6-18.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-selinux@10.2.6-18.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"product": {
"name": "grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"product_id": "grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debugsource@10.2.6-18.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"product": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"product_id": "grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/grafana-debuginfo@10.2.6-18.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64"
},
"product_reference": "grafana-0:10.2.6-18.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le"
},
"product_reference": "grafana-0:10.2.6-18.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x"
},
"product_reference": "grafana-0:10.2.6-18.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_6.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src"
},
"product_reference": "grafana-0:10.2.6-18.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-0:10.2.6-18.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64"
},
"product_reference": "grafana-0:10.2.6-18.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debuginfo-0:10.2.6-18.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64"
},
"product_reference": "grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-debugsource-0:10.2.6-18.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64"
},
"product_reference": "grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-selinux-0:10.2.6-18.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
},
"product_reference": "grafana-selinux-0:10.2.6-18.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T08:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3833"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T08:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3833"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T08:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3833"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T08:23:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3833"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.src",
"AppStream-9.6.0.Z.EUS:grafana-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debuginfo-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-debugsource-0:10.2.6-18.el9_6.x86_64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.aarch64",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.ppc64le",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.s390x",
"AppStream-9.6.0.Z.EUS:grafana-selinux-0:10.2.6-18.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3186
Vulnerability from csaf_redhat - Published: 2026-02-26 02:56 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat build of Cryostat 4.1.1 on RHEL 9 container images are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Cryostat 4 on RHEL 9 container images have been updated to fix several bugs.\n\nUsers of Cryostat 4 on RHEL 9 container images are advised to upgrade to these updated images, which contain backported patches to fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.\n\nSecurity Fix(es):\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nYou can find images updated by this advisory in the Red Hat Container Catalog (see the References section).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3186",
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3186.json"
}
],
"title": "Red Hat Security Advisory: Red Hat build of Cryostat 4.1.1: new RHEL 9 container image security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:39+00:00",
"generator": {
"date": "2026-03-07T19:55:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3186",
"initial_release_date": "2026-02-26T02:56:36+00:00",
"revision_history": [
{
"date": "2026-02-26T02:56:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-26T02:56:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Cryostat 4 on RHEL 9",
"product": {
"name": "Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cryostat:4::el9"
}
}
}
],
"category": "product_family",
"name": "Cryostat"
},
{
"branches": [
{
"category": "product_version",
"name": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"product": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"product_id": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-agent-init-rhel9\u0026tag=0.6.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"product": {
"name": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"product_id": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-db-rhel9\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"product": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"product_id": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-grafana-dashboard-rhel9\u0026tag=4.1.1-2"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"product": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"product_id": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-openshift-console-plugin-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"product": {
"name": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"product_id": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-reports-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"product": {
"name": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"product_id": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"product": {
"name": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"product_id": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-operator-bundle\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"product": {
"name": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"product_id": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9-operator\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"product": {
"name": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"product_id": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/cryostat-storage-rhel9\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"product": {
"name": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"product_id": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6?arch=arm64\u0026repository_url=registry.redhat.io/cryostat/jfr-datasource-rhel9\u0026tag=4.1.1-1"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"product": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"product_id": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-agent-init-rhel9\u0026tag=0.6.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"product": {
"name": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"product_id": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-db-rhel9\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"product": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"product_id": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-grafana-dashboard-rhel9\u0026tag=4.1.1-2"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"product": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"product_id": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-openshift-console-plugin-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"product": {
"name": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"product_id": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-reports-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"product": {
"name": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"product_id": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"product": {
"name": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"product_id": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-operator-bundle\u0026tag=4.1.1-1"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"product": {
"name": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"product_id": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-rhel9-operator\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"product": {
"name": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"product_id": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/cryostat-storage-rhel9\u0026tag=4.1.1-3"
}
}
},
{
"category": "product_version",
"name": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64",
"product": {
"name": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64",
"product_id": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd?arch=amd64\u0026repository_url=registry.redhat.io/cryostat/jfr-datasource-rhel9\u0026tag=4.1.1-1"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64"
},
"product_reference": "cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64"
},
"product_reference": "cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64"
},
"product_reference": "cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64"
},
"product_reference": "cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64"
},
"product_reference": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64"
},
"product_reference": "cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64"
},
"product_reference": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64"
},
"product_reference": "cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64"
},
"product_reference": "cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64"
},
"product_reference": "cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64"
},
"product_reference": "cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64"
},
"product_reference": "cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64"
},
"product_reference": "cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64"
},
"product_reference": "cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64"
},
"product_reference": "cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64"
},
"product_reference": "cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64"
},
"product_reference": "cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
},
"product_reference": "cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64"
},
"product_reference": "cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"relates_to_product_reference": "9Base-Cryostat-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64 as a component of Cryostat 4 on RHEL 9",
"product_id": "9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
},
"product_reference": "cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64",
"relates_to_product_reference": "9Base-Cryostat-4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"known_not_affected": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T02:56:36+00:00",
"details": "You can download the Cryostat 4 on RHEL 9 container images that this update provides from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available in the Red Hat Container Catalog (see the References section).\n\nDockerfiles and scripts should be amended to refer to this new image specifically or to the latest image generally.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"known_not_affected": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T02:56:36+00:00",
"details": "You can download the Cryostat 4 on RHEL 9 container images that this update provides from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available in the Red Hat Container Catalog (see the References section).\n\nDockerfiles and scripts should be amended to refer to this new image specifically or to the latest image generally.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"known_not_affected": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T02:56:36+00:00",
"details": "You can download the Cryostat 4 on RHEL 9 container images that this update provides from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available in the Red Hat Container Catalog (see the References section).\n\nDockerfiles and scripts should be amended to refer to this new image specifically or to the latest image generally.",
"product_ids": [
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:ba711294dc42ddc4bf9ebfc663f56cbfd583a146c5d2726b04807e38c4a12e24_arm64",
"9Base-Cryostat-4:cryostat/cryostat-agent-init-rhel9@sha256:c27fea43f5c8ad8df258d0bf8c751bc9a59cb6013fad82542e01a1a0d25387b4_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:b79cc2a7dfd2b0c0f532a884b2abd1c0c9b460709ecb897646f1cc105a8f10f9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-db-rhel9@sha256:f2b48d6dea021ff7848d051f586306c92b7db9dd2678bd7911c4fcf25cceea74_arm64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:77b9eb8a7f42a2695b3add2809c52a99098dbebb3d4208e4edcec2cb66feceb8_amd64",
"9Base-Cryostat-4:cryostat/cryostat-grafana-dashboard-rhel9@sha256:7d3316244a4c218c69a6f9eee6490d8852f20fd8d271b553e6f1f504ece84ff4_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:171536e7fbce24727dfedf83c0068d05ef6a8f98fbe296165d30d84b1eefa718_arm64",
"9Base-Cryostat-4:cryostat/cryostat-openshift-console-plugin-rhel9@sha256:3750c0350aa3d27d97562d8c82d80900bf9f876335e0e6879bd8728d88df2a02_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:94a88599a40d8bff8dc852371669a3c36b8fb6ecfbfd17ec4e0ff6f65f5fe435_amd64",
"9Base-Cryostat-4:cryostat/cryostat-operator-bundle@sha256:9dbb055afdbc7291bb59bc818e4a12bebbf249af9f1453e0e9c4ea47e8bbf4ec_arm64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:4090fc0f5fedf0c99537885c6562ed4f457898580795bc3ff06c36b305c1d254_amd64",
"9Base-Cryostat-4:cryostat/cryostat-reports-rhel9@sha256:a240e1b80eee3114ce64c27ca9afbb66e8c1f820816023dfb2f4b7d394b0d07c_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:3dac77f627d8dcacaa45498a63a12f7b76c5086a9ac13877b9ccab7571545438_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9-operator@sha256:bde24dc6b2e929bf96be268ed1a171505d2b042723bbbaf43c2549b37ff2a6c9_amd64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:85a96d049a3feeab643966aa9e8eef2f4592051cd0f49c536f92fe5d272f4f03_arm64",
"9Base-Cryostat-4:cryostat/cryostat-rhel9@sha256:d1db787820f7f60a76341f72641a0ec653b29b048b3dccf348f2026379321391_amd64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:3d32c82c26a425e5f952664bba8e2262a51de740aed8dc58dc51d5058a2e9670_arm64",
"9Base-Cryostat-4:cryostat/cryostat-storage-rhel9@sha256:90119c056c8ce60631fef02c4a3df39e3b17de535bf26963ff4931b39cc0f61d_amd64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:476cfce49a28a07afb6e9d9cf01554773d7c2d67a8a8dee8f11883461b68abc6_arm64",
"9Base-Cryostat-4:cryostat/jfr-datasource-rhel9@sha256:ee3530b61cba41519ac6b29aea39cb6f39c4e2c379d891ce8d9fe4914f5892dd_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3336
Vulnerability from csaf_redhat - Published: 2026-02-25 11:30 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for podman is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3336",
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3336.json"
}
],
"title": "Red Hat Security Advisory: podman security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:42+00:00",
"generator": {
"date": "2026-03-07T19:55:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3336",
"initial_release_date": "2026-02-25T11:30:01+00:00",
"revision_history": [
{
"date": "2026-02-25T11:30:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T11:30:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.src",
"product": {
"name": "podman-7:5.6.0-12.el10_1.src",
"product_id": "podman-7:5.6.0-12.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=src\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"product": {
"name": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"product_id": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-12.el10_1?arch=aarch64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"product": {
"name": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"product_id": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-12.el10_1?arch=ppc64le\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"product": {
"name": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"product_id": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-12.el10_1?arch=x86_64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-remote-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-remote-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests-debuginfo@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "podman-tests-7:5.6.0-12.el10_1.s390x",
"product": {
"name": "podman-tests-7:5.6.0-12.el10_1.s390x",
"product_id": "podman-tests-7:5.6.0-12.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@5.6.0-12.el10_1?arch=s390x\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-7:5.6.0-12.el10_1.noarch",
"product": {
"name": "podman-docker-7:5.6.0-12.el10_1.noarch",
"product_id": "podman-docker-7:5.6.0-12.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@5.6.0-12.el10_1?arch=noarch\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src"
},
"product_reference": "podman-7:5.6.0-12.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-7:5.6.0-12.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch"
},
"product_reference": "podman-docker-7:5.6.0-12.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src"
},
"product_reference": "podman-7:5.6.0-12.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-7:5.6.0-12.el10_1.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch"
},
"product_reference": "podman-docker-7:5.6.0-12.el10_1.noarch",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-remote-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-tests-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
},
"product_reference": "podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:30:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61728",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:39.965024+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "RHBZ#2434431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
},
{
"category": "external",
"summary": "https://go.dev/cl/736713",
"url": "https://go.dev/cl/736713"
},
{
"category": "external",
"summary": "https://go.dev/issue/77102",
"url": "https://go.dev/issue/77102"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4342",
"url": "https://pkg.go.dev/vuln/GO-2026-4342"
}
],
"release_date": "2026-01-28T19:30:31.354000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:30:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:30:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T11:30:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"AppStream-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"AppStream-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.src",
"CRB-10.1.Z:podman-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-debugsource-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-docker-7:5.6.0-12.el10_1.noarch",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-remote-debuginfo-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-7:5.6.0-12.el10_1.x86_64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.aarch64",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.ppc64le",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.s390x",
"CRB-10.1.Z:podman-tests-debuginfo-7:5.6.0-12.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3842
Vulnerability from csaf_redhat - Published: 2026-03-05 11:24 - Updated: 2026-03-06 20:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for delve is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you\u0027re using a debugger, things aren\u0027t going your way. With that in mind, Delve should stay out of your way as much as possible.\n\nSecurity Fix(es):\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3842",
"url": "https://access.redhat.com/errata/RHSA-2026:3842"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3842.json"
}
],
"title": "Red Hat Security Advisory: delve security update",
"tracking": {
"current_release_date": "2026-03-06T20:37:32+00:00",
"generator": {
"date": "2026-03-06T20:37:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3842",
"initial_release_date": "2026-03-05T11:24:36+00:00",
"revision_history": [
{
"date": "2026-03-05T11:24:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T11:24:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-06T20:37:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el9_7.src",
"product": {
"name": "delve-0:1.25.2-2.el9_7.src",
"product_id": "delve-0:1.25.2-2.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el9_7.aarch64",
"product": {
"name": "delve-0:1.25.2-2.el9_7.aarch64",
"product_id": "delve-0:1.25.2-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el9_7.aarch64",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el9_7.aarch64",
"product_id": "delve-debugsource-0:1.25.2-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el9_7.aarch64",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el9_7.aarch64",
"product_id": "delve-debuginfo-0:1.25.2-2.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el9_7.ppc64le",
"product": {
"name": "delve-0:1.25.2-2.el9_7.ppc64le",
"product_id": "delve-0:1.25.2-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el9_7.ppc64le",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el9_7.ppc64le",
"product_id": "delve-debugsource-0:1.25.2-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el9_7.ppc64le",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el9_7.ppc64le",
"product_id": "delve-debuginfo-0:1.25.2-2.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "delve-0:1.25.2-2.el9_7.x86_64",
"product": {
"name": "delve-0:1.25.2-2.el9_7.x86_64",
"product_id": "delve-0:1.25.2-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve@1.25.2-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debugsource-0:1.25.2-2.el9_7.x86_64",
"product": {
"name": "delve-debugsource-0:1.25.2-2.el9_7.x86_64",
"product_id": "delve-debugsource-0:1.25.2-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debugsource@1.25.2-2.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "delve-debuginfo-0:1.25.2-2.el9_7.x86_64",
"product": {
"name": "delve-debuginfo-0:1.25.2-2.el9_7.x86_64",
"product_id": "delve-debuginfo-0:1.25.2-2.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/delve-debuginfo@1.25.2-2.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.aarch64"
},
"product_reference": "delve-0:1.25.2-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.ppc64le"
},
"product_reference": "delve-0:1.25.2-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.src"
},
"product_reference": "delve-0:1.25.2-2.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-0:1.25.2-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.x86_64"
},
"product_reference": "delve-0:1.25.2-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.aarch64"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.ppc64le"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debuginfo-0:1.25.2-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.x86_64"
},
"product_reference": "delve-debuginfo-0:1.25.2-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.aarch64"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.ppc64le"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "delve-debugsource-0:1.25.2-2.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.x86_64"
},
"product_reference": "delve-debugsource-0:1.25.2-2.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T11:24:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3842"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.src",
"AppStream-9.7.0.Z.MAIN:delve-0:1.25.2-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-debuginfo-0:1.25.2-2.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:delve-debugsource-0:1.25.2-2.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
RHSA-2026:3297
Vulnerability from csaf_redhat - Published: 2026-02-25 09:09 - Updated: 2026-03-07 19:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for buildah is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. \n\nSecurity Fix(es):\n\n* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)\n\n* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3297",
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3297.json"
}
],
"title": "Red Hat Security Advisory: buildah security update",
"tracking": {
"current_release_date": "2026-03-07T19:55:41+00:00",
"generator": {
"date": "2026-03-07T19:55:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2026:3297",
"initial_release_date": "2026-02-25T09:09:30+00:00",
"revision_history": [
{
"date": "2026-02-25T09:09:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-25T09:09:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-07T19:55:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.src",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.src",
"product_id": "buildah-2:1.41.8-2.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-tests-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-tests-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el10_1?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el10_1?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-tests-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-tests-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el10_1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "buildah-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-tests-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-tests-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"product": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"product_id": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.41.8-2.el10_1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-tests-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-tests-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-tests-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
},
"product_reference": "buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:09:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:09:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-68121",
"discovery_date": "2026-02-05T18:01:30.086058+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437111"
}
],
"notes": [
{
"category": "description",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/tls: Unexpected session resumption in crypto/tls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "RHBZ#2437111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"category": "external",
"summary": "https://go.dev/cl/737700",
"url": "https://go.dev/cl/737700"
},
{
"category": "external",
"summary": "https://go.dev/issue/77217",
"url": "https://go.dev/issue/77217"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4337",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"release_date": "2026-02-05T17:48:44.141000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-25T09:09:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.src",
"AppStream-10.1.Z:buildah-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debuginfo-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-debugsource-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-2:1.41.8-2.el10_1.x86_64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.aarch64",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.ppc64le",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.s390x",
"AppStream-10.1.Z:buildah-tests-debuginfo-2:1.41.8-2.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "crypto/tls: Unexpected session resumption in crypto/tls"
}
]
}
OPENSUSE-SU-2026:20220-1
Vulnerability from csaf_opensuse - Published: 2026-02-13 11:53 - Updated: 2026-02-13 11:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to version 1.24.13.\n\nSecurity issues fixed:\n\n- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).\n- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does\n not account for the expiration of full certificate chain (bsc#1256818).\n- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc1256820).\n\nOther updates and bugfixes:\n\n- version update to 1.24.13:\n\n * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs\n * go#77424 crypto/tls: CL 737700 broke session resumption on macOS\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-270",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20220-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1257692",
"url": "https://bugzilla.suse.com/1257692"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-02-13T11:53:30Z",
"generator": {
"date": "2026-02-13T11:53:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20220-1",
"initial_release_date": "2026-02-13T11:53:30Z",
"revision_history": [
{
"date": "2026-02-13T11:53:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.13-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.13-160000.1.1.aarch64",
"product_id": "go1.24-1.24.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.13-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.13-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.13-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.13-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.13-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.13-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.13-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.13-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.13-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.13-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.13-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.13-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.13-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.13-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.13-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.13-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.13-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.13-160000.1.1.s390x",
"product_id": "go1.24-1.24.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.13-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.13-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.13-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.13-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.13-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.13-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.13-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.13-160000.1.1.x86_64",
"product_id": "go1.24-1.24.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.13-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.13-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.13-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.13-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.13-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.13-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.13-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.13-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.13-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.13-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.13-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.13-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.13-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.13-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.13-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.13-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T11:53:30Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T11:53:30Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.13-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.13-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T11:53:30Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10224-1
Vulnerability from csaf_opensuse - Published: 2026-02-18 00:00 - Updated: 2026-02-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "rclone-1.73.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the rclone-1.73.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10224",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10224-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "rclone-1.73.1-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-18T00:00:00Z",
"generator": {
"date": "2026-02-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10224-1",
"initial_release_date": "2026-02-18T00:00:00Z",
"revision_history": [
{
"date": "2026-02-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.1-1.1.aarch64",
"product": {
"name": "rclone-1.73.1-1.1.aarch64",
"product_id": "rclone-1.73.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.1-1.1.aarch64",
"product": {
"name": "rclone-bash-completion-1.73.1-1.1.aarch64",
"product_id": "rclone-bash-completion-1.73.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.1-1.1.aarch64",
"product": {
"name": "rclone-zsh-completion-1.73.1-1.1.aarch64",
"product_id": "rclone-zsh-completion-1.73.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.1-1.1.ppc64le",
"product": {
"name": "rclone-1.73.1-1.1.ppc64le",
"product_id": "rclone-1.73.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.1-1.1.ppc64le",
"product": {
"name": "rclone-bash-completion-1.73.1-1.1.ppc64le",
"product_id": "rclone-bash-completion-1.73.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.1-1.1.ppc64le",
"product": {
"name": "rclone-zsh-completion-1.73.1-1.1.ppc64le",
"product_id": "rclone-zsh-completion-1.73.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.1-1.1.s390x",
"product": {
"name": "rclone-1.73.1-1.1.s390x",
"product_id": "rclone-1.73.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.1-1.1.s390x",
"product": {
"name": "rclone-bash-completion-1.73.1-1.1.s390x",
"product_id": "rclone-bash-completion-1.73.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.1-1.1.s390x",
"product": {
"name": "rclone-zsh-completion-1.73.1-1.1.s390x",
"product_id": "rclone-zsh-completion-1.73.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rclone-1.73.1-1.1.x86_64",
"product": {
"name": "rclone-1.73.1-1.1.x86_64",
"product_id": "rclone-1.73.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rclone-bash-completion-1.73.1-1.1.x86_64",
"product": {
"name": "rclone-bash-completion-1.73.1-1.1.x86_64",
"product_id": "rclone-bash-completion-1.73.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rclone-zsh-completion-1.73.1-1.1.x86_64",
"product": {
"name": "rclone-zsh-completion-1.73.1-1.1.x86_64",
"product_id": "rclone-zsh-completion-1.73.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.1-1.1.aarch64"
},
"product_reference": "rclone-1.73.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.1-1.1.ppc64le"
},
"product_reference": "rclone-1.73.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.1-1.1.s390x"
},
"product_reference": "rclone-1.73.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-1.73.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-1.73.1-1.1.x86_64"
},
"product_reference": "rclone-1.73.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.aarch64"
},
"product_reference": "rclone-bash-completion-1.73.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.ppc64le"
},
"product_reference": "rclone-bash-completion-1.73.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.s390x"
},
"product_reference": "rclone-bash-completion-1.73.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-bash-completion-1.73.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.x86_64"
},
"product_reference": "rclone-bash-completion-1.73.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.aarch64"
},
"product_reference": "rclone-zsh-completion-1.73.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.ppc64le"
},
"product_reference": "rclone-zsh-completion-1.73.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.s390x"
},
"product_reference": "rclone-zsh-completion-1.73.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rclone-zsh-completion-1.73.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.x86_64"
},
"product_reference": "rclone-zsh-completion-1.73.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rclone-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rclone-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:rclone-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-bash-completion-1.73.1-1.1.x86_64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.aarch64",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.ppc64le",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.s390x",
"openSUSE Tumbleweed:rclone-zsh-completion-1.73.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10063-1
Vulnerability from csaf_opensuse - Published: 2026-01-18 00:00 - Updated: 2026-01-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.24-1.24.12-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.24-1.24.12-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10063",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10063-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "go1.24-1.24.12-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-18T00:00:00Z",
"generator": {
"date": "2026-01-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10063-1",
"initial_release_date": "2026-01-18T00:00:00Z",
"revision_history": [
{
"date": "2026-01-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-1.1.aarch64",
"product_id": "go1.24-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-1.1.aarch64",
"product_id": "go1.24-race-1.24.12-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-1.1.ppc64le",
"product_id": "go1.24-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.ppc64le",
"product_id": "go1.24-libstd-1.24.12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-1.24.12-1.1.s390x",
"product_id": "go1.24-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-1.1.s390x",
"product_id": "go1.24-doc-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.s390x",
"product_id": "go1.24-libstd-1.24.12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-1.1.s390x",
"product_id": "go1.24-race-1.24.12-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-1.1.x86_64",
"product_id": "go1.24-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-1.1.x86_64",
"product_id": "go1.24-race-1.24.12-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-doc-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-libstd-1.24.12-1.1.x86_64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.aarch64",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.ppc64le",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.s390x",
"openSUSE Tumbleweed:go1.24-race-1.24.12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10064-1
Vulnerability from csaf_opensuse - Published: 2026-01-18 00:00 - Updated: 2026-01-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.25-1.25.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.25-1.25.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10064",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10064-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "go1.25-1.25.6-1.1 on GA media",
"tracking": {
"current_release_date": "2026-01-18T00:00:00Z",
"generator": {
"date": "2026-01-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10064-1",
"initial_release_date": "2026-01-18T00:00:00Z",
"revision_history": [
{
"date": "2026-01-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-1.1.aarch64",
"product_id": "go1.25-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-1.1.aarch64",
"product_id": "go1.25-race-1.25.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-1.1.ppc64le",
"product_id": "go1.25-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.ppc64le",
"product_id": "go1.25-libstd-1.25.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-1.25.6-1.1.s390x",
"product_id": "go1.25-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-1.1.s390x",
"product_id": "go1.25-doc-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.s390x",
"product_id": "go1.25-libstd-1.25.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-1.1.s390x",
"product_id": "go1.25-race-1.25.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-1.1.x86_64",
"product_id": "go1.25-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-1.1.x86_64",
"product_id": "go1.25-race-1.25.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-doc-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-libstd-1.25.6-1.1.x86_64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.aarch64",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.ppc64le",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.s390x",
"openSUSE Tumbleweed:go1.25-race-1.25.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:20077-1
Vulnerability from csaf_opensuse - Published: 2026-01-22 12:53 - Updated: 2026-01-22 12:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-166",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20077-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:53:33Z",
"generator": {
"date": "2026-01-22T12:53:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20077-1",
"initial_release_date": "2026-01-22T12:53:33Z",
"revision_history": [
{
"date": "2026-01-22T12:53:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.12-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.12-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.12-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:33Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:20085-1
Vulnerability from csaf_opensuse - Published: 2026-01-22 15:49 - Updated: 2026-01-22 15:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-174",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20085-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T15:49:20Z",
"generator": {
"date": "2026-01-22T15:49:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20085-1",
"initial_release_date": "2026-01-22T15:49:20Z",
"revision_history": [
{
"date": "2026-01-22T15:49:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.6-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.6-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.6-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:49:20Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10233-1
Vulnerability from csaf_opensuse - Published: 2026-02-20 00:00 - Updated: 2026-02-20 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kyverno-1.17.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kyverno-1.17.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10233",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10233-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "kyverno-1.17.1-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-20T00:00:00Z",
"generator": {
"date": "2026-02-20T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10233-1",
"initial_release_date": "2026-02-20T00:00:00Z",
"revision_history": [
{
"date": "2026-02-20T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kyverno-1.17.1-1.1.aarch64",
"product": {
"name": "kyverno-1.17.1-1.1.aarch64",
"product_id": "kyverno-1.17.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kyverno-bash-completion-1.17.1-1.1.aarch64",
"product": {
"name": "kyverno-bash-completion-1.17.1-1.1.aarch64",
"product_id": "kyverno-bash-completion-1.17.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kyverno-fish-completion-1.17.1-1.1.aarch64",
"product": {
"name": "kyverno-fish-completion-1.17.1-1.1.aarch64",
"product_id": "kyverno-fish-completion-1.17.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kyverno-zsh-completion-1.17.1-1.1.aarch64",
"product": {
"name": "kyverno-zsh-completion-1.17.1-1.1.aarch64",
"product_id": "kyverno-zsh-completion-1.17.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kyverno-1.17.1-1.1.ppc64le",
"product": {
"name": "kyverno-1.17.1-1.1.ppc64le",
"product_id": "kyverno-1.17.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kyverno-bash-completion-1.17.1-1.1.ppc64le",
"product": {
"name": "kyverno-bash-completion-1.17.1-1.1.ppc64le",
"product_id": "kyverno-bash-completion-1.17.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kyverno-fish-completion-1.17.1-1.1.ppc64le",
"product": {
"name": "kyverno-fish-completion-1.17.1-1.1.ppc64le",
"product_id": "kyverno-fish-completion-1.17.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"product": {
"name": "kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"product_id": "kyverno-zsh-completion-1.17.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kyverno-1.17.1-1.1.s390x",
"product": {
"name": "kyverno-1.17.1-1.1.s390x",
"product_id": "kyverno-1.17.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kyverno-bash-completion-1.17.1-1.1.s390x",
"product": {
"name": "kyverno-bash-completion-1.17.1-1.1.s390x",
"product_id": "kyverno-bash-completion-1.17.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kyverno-fish-completion-1.17.1-1.1.s390x",
"product": {
"name": "kyverno-fish-completion-1.17.1-1.1.s390x",
"product_id": "kyverno-fish-completion-1.17.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kyverno-zsh-completion-1.17.1-1.1.s390x",
"product": {
"name": "kyverno-zsh-completion-1.17.1-1.1.s390x",
"product_id": "kyverno-zsh-completion-1.17.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kyverno-1.17.1-1.1.x86_64",
"product": {
"name": "kyverno-1.17.1-1.1.x86_64",
"product_id": "kyverno-1.17.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kyverno-bash-completion-1.17.1-1.1.x86_64",
"product": {
"name": "kyverno-bash-completion-1.17.1-1.1.x86_64",
"product_id": "kyverno-bash-completion-1.17.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kyverno-fish-completion-1.17.1-1.1.x86_64",
"product": {
"name": "kyverno-fish-completion-1.17.1-1.1.x86_64",
"product_id": "kyverno-fish-completion-1.17.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kyverno-zsh-completion-1.17.1-1.1.x86_64",
"product": {
"name": "kyverno-zsh-completion-1.17.1-1.1.x86_64",
"product_id": "kyverno-zsh-completion-1.17.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-1.17.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-1.17.1-1.1.aarch64"
},
"product_reference": "kyverno-1.17.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-1.17.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-1.17.1-1.1.ppc64le"
},
"product_reference": "kyverno-1.17.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-1.17.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-1.17.1-1.1.s390x"
},
"product_reference": "kyverno-1.17.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-1.17.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-1.17.1-1.1.x86_64"
},
"product_reference": "kyverno-1.17.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-bash-completion-1.17.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.aarch64"
},
"product_reference": "kyverno-bash-completion-1.17.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-bash-completion-1.17.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.ppc64le"
},
"product_reference": "kyverno-bash-completion-1.17.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-bash-completion-1.17.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.s390x"
},
"product_reference": "kyverno-bash-completion-1.17.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-bash-completion-1.17.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.x86_64"
},
"product_reference": "kyverno-bash-completion-1.17.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-fish-completion-1.17.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.aarch64"
},
"product_reference": "kyverno-fish-completion-1.17.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-fish-completion-1.17.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.ppc64le"
},
"product_reference": "kyverno-fish-completion-1.17.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-fish-completion-1.17.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.s390x"
},
"product_reference": "kyverno-fish-completion-1.17.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-fish-completion-1.17.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.x86_64"
},
"product_reference": "kyverno-fish-completion-1.17.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-zsh-completion-1.17.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.aarch64"
},
"product_reference": "kyverno-zsh-completion-1.17.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-zsh-completion-1.17.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.ppc64le"
},
"product_reference": "kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-zsh-completion-1.17.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.s390x"
},
"product_reference": "kyverno-zsh-completion-1.17.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kyverno-zsh-completion-1.17.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.x86_64"
},
"product_reference": "kyverno-zsh-completion-1.17.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-bash-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-fish-completion-1.17.1-1.1.x86_64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.aarch64",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.ppc64le",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.s390x",
"openSUSE Tumbleweed:kyverno-zsh-completion-1.17.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-20T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:10220-1
Vulnerability from csaf_opensuse - Published: 2026-02-18 00:00 - Updated: 2026-02-18 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "istioctl-1.28.4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the istioctl-1.28.4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10220",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10220-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "istioctl-1.28.4-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-18T00:00:00Z",
"generator": {
"date": "2026-02-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10220-1",
"initial_release_date": "2026-02-18T00:00:00Z",
"revision_history": [
{
"date": "2026-02-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "istioctl-1.28.4-1.1.aarch64",
"product": {
"name": "istioctl-1.28.4-1.1.aarch64",
"product_id": "istioctl-1.28.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "istioctl-bash-completion-1.28.4-1.1.aarch64",
"product": {
"name": "istioctl-bash-completion-1.28.4-1.1.aarch64",
"product_id": "istioctl-bash-completion-1.28.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "istioctl-zsh-completion-1.28.4-1.1.aarch64",
"product": {
"name": "istioctl-zsh-completion-1.28.4-1.1.aarch64",
"product_id": "istioctl-zsh-completion-1.28.4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "istioctl-1.28.4-1.1.ppc64le",
"product": {
"name": "istioctl-1.28.4-1.1.ppc64le",
"product_id": "istioctl-1.28.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "istioctl-bash-completion-1.28.4-1.1.ppc64le",
"product": {
"name": "istioctl-bash-completion-1.28.4-1.1.ppc64le",
"product_id": "istioctl-bash-completion-1.28.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"product": {
"name": "istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"product_id": "istioctl-zsh-completion-1.28.4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "istioctl-1.28.4-1.1.s390x",
"product": {
"name": "istioctl-1.28.4-1.1.s390x",
"product_id": "istioctl-1.28.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "istioctl-bash-completion-1.28.4-1.1.s390x",
"product": {
"name": "istioctl-bash-completion-1.28.4-1.1.s390x",
"product_id": "istioctl-bash-completion-1.28.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "istioctl-zsh-completion-1.28.4-1.1.s390x",
"product": {
"name": "istioctl-zsh-completion-1.28.4-1.1.s390x",
"product_id": "istioctl-zsh-completion-1.28.4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "istioctl-1.28.4-1.1.x86_64",
"product": {
"name": "istioctl-1.28.4-1.1.x86_64",
"product_id": "istioctl-1.28.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "istioctl-bash-completion-1.28.4-1.1.x86_64",
"product": {
"name": "istioctl-bash-completion-1.28.4-1.1.x86_64",
"product_id": "istioctl-bash-completion-1.28.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "istioctl-zsh-completion-1.28.4-1.1.x86_64",
"product": {
"name": "istioctl-zsh-completion-1.28.4-1.1.x86_64",
"product_id": "istioctl-zsh-completion-1.28.4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-1.28.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64"
},
"product_reference": "istioctl-1.28.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-1.28.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le"
},
"product_reference": "istioctl-1.28.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-1.28.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x"
},
"product_reference": "istioctl-1.28.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-1.28.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64"
},
"product_reference": "istioctl-1.28.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-bash-completion-1.28.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64"
},
"product_reference": "istioctl-bash-completion-1.28.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-bash-completion-1.28.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le"
},
"product_reference": "istioctl-bash-completion-1.28.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-bash-completion-1.28.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x"
},
"product_reference": "istioctl-bash-completion-1.28.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-bash-completion-1.28.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64"
},
"product_reference": "istioctl-bash-completion-1.28.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-zsh-completion-1.28.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64"
},
"product_reference": "istioctl-zsh-completion-1.28.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-zsh-completion-1.28.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le"
},
"product_reference": "istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-zsh-completion-1.28.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x"
},
"product_reference": "istioctl-zsh-completion-1.28.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "istioctl-zsh-completion-1.28.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
},
"product_reference": "istioctl-zsh-completion-1.28.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-18T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-bash-completion-1.28.4-1.1.x86_64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.aarch64",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.ppc64le",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.s390x",
"openSUSE Tumbleweed:istioctl-zsh-completion-1.28.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
OPENSUSE-SU-2026:20214-1
Vulnerability from csaf_opensuse - Published: 2026-02-13 10:08 - Updated: 2026-02-13 10:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to version 1.25.7.\n\nSecurity issues fixed:\n\n- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).\n- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does\n not account for the expiration of full certificate chain (bsc#1256818).\n\nOther updates and bugfixes:\n\n- version update to 1.25.7:\n\n * go#75844 cmd/compile: OOM killed on linux/arm64\n * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs\n * go#77425 crypto/tls: CL 737700 broke session resumption on macOS\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-269",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20214-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1257692",
"url": "https://bugzilla.suse.com/1257692"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-02-13T10:08:14Z",
"generator": {
"date": "2026-02-13T10:08:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20214-1",
"initial_release_date": "2026-02-13T10:08:14Z",
"revision_history": [
{
"date": "2026-02-13T10:08:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.7-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.7-160000.1.1.aarch64",
"product_id": "go1.25-1.25.7-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.7-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.7-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.7-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.7-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.7-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.7-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.7-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.7-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.7-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.7-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.7-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.7-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.7-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.7-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.7-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.7-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.7-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.7-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.7-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.7-160000.1.1.s390x",
"product_id": "go1.25-1.25.7-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.7-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.7-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.7-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.7-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.7-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.7-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.7-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.7-160000.1.1.x86_64",
"product_id": "go1.25-1.25.7-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.7-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.7-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.7-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.7-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.7-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.7-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.7-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.7-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.7-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.7-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.7-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.7-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.7-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.7-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.7-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.7-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.7-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.7-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.7-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.7-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.7-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.7-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.7-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.7-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.7-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.7-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.7-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.7-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.7-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.7-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.7-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.7-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.7-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.7-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.7-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.7-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.7-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T10:08:14Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-doc-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-libstd-1.25.7-160000.1.1.x86_64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.aarch64",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.ppc64le",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.s390x",
"openSUSE Leap 16.0:go1.25-race-1.25.7-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-13T10:08:14Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0219-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:13 - Updated: 2026-01-22 12:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-219,SUSE-SLE-Module-Development-Tools-15-SP7-2026-219,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-219,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-219,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-219,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-219,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-219,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-219,openSUSE-SLE-15.6-2026-219",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0219-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0219-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260219-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0219-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:13:47Z",
"generator": {
"date": "2026-01-22T12:13:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0219-1",
"initial_release_date": "2026-01-22T12:13:47Z",
"revision_history": [
{
"date": "2026-01-22T12:13:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-1.24.12-150000.1.53.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.i586",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.i586",
"product_id": "go1.24-1.24.12-150000.1.53.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.i586",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.i586",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-1.24.12-150000.1.53.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-1.24.12-150000.1.53.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-1.24.12-150000.1.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-doc-1.24.12-150000.1.53.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"product_id": "go1.24-race-1.24.12-150000.1.53.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-150000.1.53.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-150000.1.53.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-race-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-doc-1.24.12-150000.1.53.1.x86_64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.aarch64",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.ppc64le",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.s390x",
"openSUSE Leap 15.6:go1.24-race-1.24.12-150000.1.53.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:13:47Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:20122-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:53 - Updated: 2026-01-22 12:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24 fixes the following issues:\n\nUpdate to go1.24.12 (released 2026-01-15) (bsc#1236217)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-166",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20122-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20122-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620122-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20122-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24",
"tracking": {
"current_release_date": "2026-01-22T12:53:24Z",
"generator": {
"date": "2026-01-22T12:53:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20122-1",
"initial_release_date": "2026-01-22T12:53:24Z",
"revision_history": [
{
"date": "2026-01-22T12:53:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64",
"product_id": "go1.24-race-1.24.12-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-doc-1.24.12-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"product_id": "go1.24-race-1.24.12-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-doc-1.24.12-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x",
"product_id": "go1.24-race-1.24.12-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-doc-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-libstd-1.24.12-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64",
"product_id": "go1.24-race-1.24.12-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-doc-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-doc-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-libstd-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-libstd-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-race-1.24.12-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
},
"product_reference": "go1.24-race-1.24.12-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.24-race-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-doc-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-libstd-1.24.12-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.24-race-1.24.12-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:53:24Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0789-1
Vulnerability from csaf_suse - Published: 2026-03-03 15:51 - Updated: 2026-03-03 15:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.13 (jsc#SLE-18320, bsc#1236217).\n\nSecurity issues fixed:\n\n- CVE-2025-61732: cmd/cgo: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).\n- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does\n not account for the expiration of full certificate chain (bsc#1256818).\n\nOther updates and bugfixes:\n \n- go#77322 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs\n- go#77424 crypto/tls: CL 737700 broke session resumption on macOS\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-789,SUSE-SLE-Module-Development-Tools-15-SP7-2026-789,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-789,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-789,openSUSE-SLE-15.6-2026-789",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0789-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0789-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260789-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0789-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024529.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1257692",
"url": "https://bugzilla.suse.com/1257692"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-03-03T15:51:34Z",
"generator": {
"date": "2026-03-03T15:51:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0789-1",
"initial_release_date": "2026-03-03T15:51:34Z",
"revision_history": [
{
"date": "2026-03-03T15:51:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"product_id": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150600.13.18.1.i586",
"product": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.i586",
"product_id": "go1.24-openssl-1.24.13-150600.13.18.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.i586",
"product_id": "go1.24-openssl-doc-1.24.13-150600.13.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"product_id": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"product_id": "go1.24-openssl-1.24.13-150600.13.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"product_id": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"product_id": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-03T15:51:34Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-03T15:51:34Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.13-150600.13.18.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.13-150600.13.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-03T15:51:34Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0218-1
Vulnerability from csaf_suse - Published: 2026-01-22 12:12 - Updated: 2026-01-22 12:12Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-218,SUSE-SLE-Module-Development-Tools-15-SP7-2026-218,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-218,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-218,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-218,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-218,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-218,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-218,openSUSE-SLE-15.6-2026-218",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0218-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0218-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260218-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0218-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T12:12:47Z",
"generator": {
"date": "2026-01-22T12:12:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0218-1",
"initial_release_date": "2026-01-22T12:12:47Z",
"revision_history": [
{
"date": "2026-01-22T12:12:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-1.25.6-150000.1.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.i586",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.i586",
"product_id": "go1.25-1.25.6-150000.1.26.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.i586",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.i586",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-1.25.6-150000.1.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-1.25.6-150000.1.26.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-1.25.6-150000.1.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-doc-1.25.6-150000.1.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"product_id": "go1.25-race-1.25.6-150000.1.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-150000.1.26.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-150000.1.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-race-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-doc-1.25.6-150000.1.26.1.x86_64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.aarch64",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.ppc64le",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.s390x",
"openSUSE Leap 15.6:go1.25-race-1.25.6-150000.1.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T12:12:47Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0296-1
Vulnerability from csaf_suse - Published: 2026-01-26 13:51 - Updated: 2026-01-26 13:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-296,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-296,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-296,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-296,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-296",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0296-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0296-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260296-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0296-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-26T13:51:05Z",
"generator": {
"date": "2026-01-26T13:51:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0296-1",
"initial_release_date": "2026-01-26T13:51:05Z",
"revision_history": [
{
"date": "2026-01-26T13:51:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.12-150000.1.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.12-150000.1.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T13:51:05Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0298-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:11 - Updated: 2026-01-26 16:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-298,SUSE-SLE-Module-Development-Tools-15-SP7-2026-298,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-298,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-298,openSUSE-SLE-15.6-2026-298",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0298-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0298-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260298-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0298-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:11:04Z",
"generator": {
"date": "2026-01-26T16:11:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0298-1",
"initial_release_date": "2026-01-26T16:11:04Z",
"revision_history": [
{
"date": "2026-01-26T16:11:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-doc-1.25.6-150600.13.9.1.x86_64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.aarch64",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.ppc64le",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.s390x",
"openSUSE Leap 15.6:go1.25-openssl-race-1.25.6-150600.13.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:11:04Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0790-1
Vulnerability from csaf_suse - Published: 2026-03-03 15:52 - Updated: 2026-03-03 15:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.7.\n\nSecurity issues fixed:\n\n- CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).\n- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does\n not account for the expiration of full certificate chain (bsc#1256818).\n\nOther updates and bugfixes:\n\n- version update to 1.25.7:\n\n * go#75844 cmd/compile: OOM killed on linux/arm64\n * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs\n * go#77425 crypto/tls: CL 737700 broke session resumption on macOS\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-790,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-790,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-790,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-790,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-790,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-790,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-790,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-790,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-790",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0790-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0790-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260790-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0790-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024528.html"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1257692",
"url": "https://bugzilla.suse.com/1257692"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-03-03T15:52:22Z",
"generator": {
"date": "2026-03-03T15:52:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0790-1",
"initial_release_date": "2026-03-03T15:52:22Z",
"revision_history": [
{
"date": "2026-03-03T15:52:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"product_id": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.7-150000.1.15.1.i586",
"product": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.i586",
"product_id": "go1.25-openssl-1.25.7-150000.1.15.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.i586",
"product_id": "go1.25-openssl-doc-1.25.7-150000.1.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"product_id": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"product_id": "go1.25-openssl-1.25.7-150000.1.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"product_id": "go1.25-openssl-race-1.25.7-150000.1.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"product_id": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-03T15:52:22Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.7-150000.1.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.7-150000.1.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-03T15:52:22Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:20132-1
Vulnerability from csaf_suse - Published: 2026-01-22 15:53 - Updated: 2026-01-22 15:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25 fixes the following issues:\n\nUpdate to go1.25.6 (released 2026-01-15) (bsc#1244485)\n\nSecurity fixes:\n\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-174",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20132-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20132-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620132-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20132-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25",
"tracking": {
"current_release_date": "2026-01-22T15:53:13Z",
"generator": {
"date": "2026-01-22T15:53:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20132-1",
"initial_release_date": "2026-01-22T15:53:13Z",
"revision_history": [
{
"date": "2026-01-22T15:53:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64",
"product_id": "go1.25-race-1.25.6-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-doc-1.25.6-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"product_id": "go1.25-race-1.25.6-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-doc-1.25.6-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x",
"product_id": "go1.25-race-1.25.6-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-doc-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-libstd-1.25.6-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64",
"product_id": "go1.25-race-1.25.6-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-doc-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-doc-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-libstd-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-libstd-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-race-1.25.6-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
},
"product_reference": "go1.25-race-1.25.6-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:go1.25-race-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-doc-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-libstd-1.25.6-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:go1.25-race-1.25.6-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-22T15:53:13Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0687-1
Vulnerability from csaf_suse - Published: 2026-02-27 15:08 - Updated: 2026-02-27 15:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1 fixes the following issues:\n\nUpdate to version 1.24.13 (jsc#SLE-18320, bsc#1236217).\n\nSecurity issues fixed:\n\n- CVE-2025-61732: cmd/cgo: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692).\n- CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n- CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does\n not account for the expiration of full certificate chain (bsc#1256818).\n\nOther updates and bugfixes:\n \n- go#77322 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs\n- go#77424 crypto/tls: CL 737700 broke session resumption on macOS\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-687,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-687,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-687,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-687,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-687,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-687,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-687,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-687,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-687",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0687-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0687-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260687-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0687-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1257692",
"url": "https://bugzilla.suse.com/1257692"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61732 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1",
"tracking": {
"current_release_date": "2026-02-27T15:08:16Z",
"generator": {
"date": "2026-02-27T15:08:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0687-1",
"initial_release_date": "2026-02-27T15:08:16Z",
"revision_history": [
{
"date": "2026-02-27T15:08:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"product_id": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150000.1.23.1.i586",
"product": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.i586",
"product_id": "go1.24-openssl-1.24.13-150000.1.23.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.i586",
"product_id": "go1.24-openssl-doc-1.24.13-150000.1.23.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"product_id": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"product_id": "go1.24-openssl-1.24.13-150000.1.23.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"product_id": "go1.24-openssl-race-1.24.13-150000.1.23.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"product_id": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61732"
}
],
"notes": [
{
"category": "general",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61732",
"url": "https://www.suse.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "SUSE Bug 1257692 for CVE-2025-61732",
"url": "https://bugzilla.suse.com/1257692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-27T15:08:16Z",
"details": "critical"
}
],
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-27T15:08:16Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-doc-1.24.13-150000.1.23.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-openssl-race-1.24.13-150000.1.23.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-27T15:08:16Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0308-1
Vulnerability from csaf_suse - Published: 2026-01-28 08:38 - Updated: 2026-01-28 08:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.24-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.24-openssl fixes the following issues:\n\nUpdate to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):\n\nSecurity fixes:\n\n - CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729: crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#74821 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol\n * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9\n * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75538 net/http: internal error: connCount underflow\n * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75951 encoding/pem: regression when decoding blocks with leading garbage\n * go#76028 pem/encoding: malformed line endings can cause panics\n * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores\n * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76796 runtime: race detector crash on ppc64le\n * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u0026lt;function\u0026gt;: runtime error: index out of range\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-308,SUSE-SLE-Module-Development-Tools-15-SP7-2026-308,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308,openSUSE-SLE-15.6-2026-308",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0308-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0308-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260308-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0308-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236217",
"url": "https://bugzilla.suse.com/1236217"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.24-openssl",
"tracking": {
"current_release_date": "2026-01-28T08:38:40Z",
"generator": {
"date": "2026-01-28T08:38:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0308-1",
"initial_release_date": "2026-01-28T08:38:40Z",
"revision_history": [
{
"date": "2026-01-28T08:38:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.i586"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"product_id": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
},
"product_reference": "go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The \"#cgo pkg-config:\" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a \"--log-file\" argument to this directive, causing pkg-config to write to an attacker-controlled location.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-doc-1.24.12-150600.13.15.1.x86_64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.aarch64",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.ppc64le",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.s390x",
"openSUSE Leap 15.6:go1.24-openssl-race-1.24.12-150600.13.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-28T08:38:40Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
SUSE-SU-2026:0297-1
Vulnerability from csaf_suse - Published: 2026-01-26 16:10 - Updated: 2026-01-26 16:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.25-openssl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.25-openssl fixes the following issues:\n\nUpdate to version 1.25.6 (released 2026-01-15) (jsc#SLE-18320, bsc#1244485):\n\nSecurity fixes:\n\n - CVE-2025-4674 cmd/go: disable support for multiple vcs in one module (bsc#1246118).\n - CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of \u0027\u0027, \u0027.\u0027 and \u0027..\u0027 in some PATH configurations (bsc#1247719).\n - CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan (bsc#1247720).\n - CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches (bsc#1249141).\n - CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames (bsc#1251257).\n - CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map (bsc#1251261).\n - CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion (bsc#1251258).\n - CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion (bsc#1251259).\n - CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints (bsc#1251254).\n - CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys (bsc#1251260).\n - CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information (bsc#1251255).\n - CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs (bsc#1251256).\n - CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse (bsc#1251262).\n - CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress (bsc#1251253).\n - CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm (bsc#1256817).\n - CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn\u0027t preclude wildcard SAN (bsc#1254430).\n - CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816).\n - CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation (bsc#1254431).\n - CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821).\n - CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819).\n - CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain (bsc#1256820).\n - CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818).\n\nOther fixes:\n\n * go#74822 cmd/go: \u0027get toolchain@latest\u0027 should ignore release candidates\n * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets\n * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755\n * go#75021 testing/synctest: bubble not terminating\n * go#75083 os: File.Seek doesn\u0027t set the correct offset with Windows overlapped handles\n * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt\n * go#75116 os: Root.MkdirAll can return \u0027file exists\u0027 when called concurrently on the same path\n * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root\n * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21\n * go#75255 cmd/compile: export to DWARF types only referenced through interfaces\n * go#75347 testing/synctest: test timeout with no runnable goroutines\n * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9\n * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining\n * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail\n * go#75537 context: Err can return non-nil before Done channel is closed\n * go#75539 net/http: internal error: connCount underflow\n * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn\n * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value\n * go#75669 runtime: debug.decoratemappings don\u0027t work as expected\n * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64\n * go#75777 spec: Go1.25 spec should be dated closer to actual release date\n * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS\n * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets\n * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot\n * go#75952 encoding/pem: regression when decoding blocks with leading garbage\n * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied\n * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should\n * go#76029 pem/encoding: malformed line endings can cause panics\n * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25\n * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup\n * go#76392 os: package initialization hangs is Stdin is blocked\n * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled\n * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes\n * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386\n * go#76776 runtime: race detector crash on ppc64le\n * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling \u003cfunction\u003e: runtime error: index out of range\n * go#76973 errors: errors.Join behavior changed in 1.25\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-297,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-297,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-297,SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-297,SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP4-2026-297,SUSE-SLE-Product-SLES_SAP-15-SP5-2026-297",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0297-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0297-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260297-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0297-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244485",
"url": "https://bugzilla.suse.com/1244485"
},
{
"category": "self",
"summary": "SUSE Bug 1245878",
"url": "https://bugzilla.suse.com/1245878"
},
{
"category": "self",
"summary": "SUSE Bug 1246118",
"url": "https://bugzilla.suse.com/1246118"
},
{
"category": "self",
"summary": "SUSE Bug 1247719",
"url": "https://bugzilla.suse.com/1247719"
},
{
"category": "self",
"summary": "SUSE Bug 1247720",
"url": "https://bugzilla.suse.com/1247720"
},
{
"category": "self",
"summary": "SUSE Bug 1247816",
"url": "https://bugzilla.suse.com/1247816"
},
{
"category": "self",
"summary": "SUSE Bug 1248082",
"url": "https://bugzilla.suse.com/1248082"
},
{
"category": "self",
"summary": "SUSE Bug 1249141",
"url": "https://bugzilla.suse.com/1249141"
},
{
"category": "self",
"summary": "SUSE Bug 1249985",
"url": "https://bugzilla.suse.com/1249985"
},
{
"category": "self",
"summary": "SUSE Bug 1251253",
"url": "https://bugzilla.suse.com/1251253"
},
{
"category": "self",
"summary": "SUSE Bug 1251254",
"url": "https://bugzilla.suse.com/1251254"
},
{
"category": "self",
"summary": "SUSE Bug 1251255",
"url": "https://bugzilla.suse.com/1251255"
},
{
"category": "self",
"summary": "SUSE Bug 1251256",
"url": "https://bugzilla.suse.com/1251256"
},
{
"category": "self",
"summary": "SUSE Bug 1251257",
"url": "https://bugzilla.suse.com/1251257"
},
{
"category": "self",
"summary": "SUSE Bug 1251258",
"url": "https://bugzilla.suse.com/1251258"
},
{
"category": "self",
"summary": "SUSE Bug 1251259",
"url": "https://bugzilla.suse.com/1251259"
},
{
"category": "self",
"summary": "SUSE Bug 1251260",
"url": "https://bugzilla.suse.com/1251260"
},
{
"category": "self",
"summary": "SUSE Bug 1251261",
"url": "https://bugzilla.suse.com/1251261"
},
{
"category": "self",
"summary": "SUSE Bug 1251262",
"url": "https://bugzilla.suse.com/1251262"
},
{
"category": "self",
"summary": "SUSE Bug 1254227",
"url": "https://bugzilla.suse.com/1254227"
},
{
"category": "self",
"summary": "SUSE Bug 1254430",
"url": "https://bugzilla.suse.com/1254430"
},
{
"category": "self",
"summary": "SUSE Bug 1254431",
"url": "https://bugzilla.suse.com/1254431"
},
{
"category": "self",
"summary": "SUSE Bug 1256816",
"url": "https://bugzilla.suse.com/1256816"
},
{
"category": "self",
"summary": "SUSE Bug 1256817",
"url": "https://bugzilla.suse.com/1256817"
},
{
"category": "self",
"summary": "SUSE Bug 1256818",
"url": "https://bugzilla.suse.com/1256818"
},
{
"category": "self",
"summary": "SUSE Bug 1256819",
"url": "https://bugzilla.suse.com/1256819"
},
{
"category": "self",
"summary": "SUSE Bug 1256820",
"url": "https://bugzilla.suse.com/1256820"
},
{
"category": "self",
"summary": "SUSE Bug 1256821",
"url": "https://bugzilla.suse.com/1256821"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4674 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47907 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47910 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47912 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61723 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61724 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61726 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61727 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61729 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61730 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61731 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68119 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68121/"
}
],
"title": "Security update for go1.25-openssl",
"tracking": {
"current_release_date": "2026-01-26T16:10:54Z",
"generator": {
"date": "2026-01-26T16:10:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0297-1",
"initial_release_date": "2026-01-26T16:10:54Z",
"revision_history": [
{
"date": "2026-01-26T16:10:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.i586"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"product_id": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
},
"product_reference": "go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4674"
}
],
"notes": [
{
"category": "general",
"text": "The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via \"go get\", are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4674",
"url": "https://www.suse.com/security/cve/CVE-2025-4674"
},
{
"category": "external",
"summary": "SUSE Bug 1246118 for CVE-2025-4674",
"url": "https://bugzilla.suse.com/1246118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-4674"
},
{
"cve": "CVE-2025-47906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47906"
}
],
"notes": [
{
"category": "general",
"text": "If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath (\"\", \".\", and \"..\"), can result in the binaries listed in the PATH being unexpectedly returned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47906",
"url": "https://www.suse.com/security/cve/CVE-2025-47906"
},
{
"category": "external",
"summary": "SUSE Bug 1247719 for CVE-2025-47906",
"url": "https://bugzilla.suse.com/1247719"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47906"
},
{
"cve": "CVE-2025-47907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47907"
}
],
"notes": [
{
"category": "general",
"text": "Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47907",
"url": "https://www.suse.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "SUSE Bug 1247720 for CVE-2025-47907",
"url": "https://bugzilla.suse.com/1247720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47907"
},
{
"cve": "CVE-2025-47910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47910"
}
],
"notes": [
{
"category": "general",
"text": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47910",
"url": "https://www.suse.com/security/cve/CVE-2025-47910"
},
{
"category": "external",
"summary": "SUSE Bug 1249141 for CVE-2025-47910",
"url": "https://bugzilla.suse.com/1249141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-47910"
},
{
"cve": "CVE-2025-47912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47912"
}
],
"notes": [
{
"category": "general",
"text": "The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: \"http://[::1]/\". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47912",
"url": "https://www.suse.com/security/cve/CVE-2025-47912"
},
{
"category": "external",
"summary": "SUSE Bug 1251257 for CVE-2025-47912",
"url": "https://bugzilla.suse.com/1251257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-47912"
},
{
"cve": "CVE-2025-58183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58183"
}
],
"notes": [
{
"category": "general",
"text": "tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58183",
"url": "https://www.suse.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "SUSE Bug 1251261 for CVE-2025-58183",
"url": "https://bugzilla.suse.com/1251261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58183"
},
{
"cve": "CVE-2025-58185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58185"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58185",
"url": "https://www.suse.com/security/cve/CVE-2025-58185"
},
{
"category": "external",
"summary": "SUSE Bug 1251258 for CVE-2025-58185",
"url": "https://bugzilla.suse.com/1251258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58185"
},
{
"cve": "CVE-2025-58186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58186"
}
],
"notes": [
{
"category": "general",
"text": "Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as \"a=;\", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58186",
"url": "https://www.suse.com/security/cve/CVE-2025-58186"
},
{
"category": "external",
"summary": "SUSE Bug 1251259 for CVE-2025-58186",
"url": "https://bugzilla.suse.com/1251259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58186"
},
{
"cve": "CVE-2025-58187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58187"
}
],
"notes": [
{
"category": "general",
"text": "Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58187",
"url": "https://www.suse.com/security/cve/CVE-2025-58187"
},
{
"category": "external",
"summary": "SUSE Bug 1251254 for CVE-2025-58187",
"url": "https://bugzilla.suse.com/1251254"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58187"
},
{
"cve": "CVE-2025-58188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58188"
}
],
"notes": [
{
"category": "general",
"text": "Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58188",
"url": "https://www.suse.com/security/cve/CVE-2025-58188"
},
{
"category": "external",
"summary": "SUSE Bug 1251260 for CVE-2025-58188",
"url": "https://bugzilla.suse.com/1251260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-58188"
},
{
"cve": "CVE-2025-58189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58189"
}
],
"notes": [
{
"category": "general",
"text": "When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58189",
"url": "https://www.suse.com/security/cve/CVE-2025-58189"
},
{
"category": "external",
"summary": "SUSE Bug 1251255 for CVE-2025-58189",
"url": "https://bugzilla.suse.com/1251255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-58189"
},
{
"cve": "CVE-2025-61723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61723"
}
],
"notes": [
{
"category": "general",
"text": "The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61723",
"url": "https://www.suse.com/security/cve/CVE-2025-61723"
},
{
"category": "external",
"summary": "SUSE Bug 1251256 for CVE-2025-61723",
"url": "https://bugzilla.suse.com/1251256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61723"
},
{
"cve": "CVE-2025-61724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61724"
}
],
"notes": [
{
"category": "general",
"text": "The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61724",
"url": "https://www.suse.com/security/cve/CVE-2025-61724"
},
{
"category": "external",
"summary": "SUSE Bug 1251262 for CVE-2025-61724",
"url": "https://bugzilla.suse.com/1251262"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61724"
},
{
"cve": "CVE-2025-61725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61725"
}
],
"notes": [
{
"category": "general",
"text": "The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61725",
"url": "https://www.suse.com/security/cve/CVE-2025-61725"
},
{
"category": "external",
"summary": "SUSE Bug 1251253 for CVE-2025-61725",
"url": "https://bugzilla.suse.com/1251253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61725"
},
{
"cve": "CVE-2025-61726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61726"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61726",
"url": "https://www.suse.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "SUSE Bug 1256817 for CVE-2025-61726",
"url": "https://bugzilla.suse.com/1256817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61727"
}
],
"notes": [
{
"category": "general",
"text": "An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61727",
"url": "https://www.suse.com/security/cve/CVE-2025-61727"
},
{
"category": "external",
"summary": "SUSE Bug 1254430 for CVE-2025-61727",
"url": "https://bugzilla.suse.com/1254430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61727"
},
{
"cve": "CVE-2025-61728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61728"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61728",
"url": "https://www.suse.com/security/cve/CVE-2025-61728"
},
{
"category": "external",
"summary": "SUSE Bug 1256816 for CVE-2025-61728",
"url": "https://bugzilla.suse.com/1256816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61729"
}
],
"notes": [
{
"category": "general",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61729",
"url": "https://www.suse.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "SUSE Bug 1254431 for CVE-2025-61729",
"url": "https://bugzilla.suse.com/1254431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61729"
},
{
"cve": "CVE-2025-61730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61730"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61730",
"url": "https://www.suse.com/security/cve/CVE-2025-61730"
},
{
"category": "external",
"summary": "SUSE Bug 1256821 for CVE-2025-61730",
"url": "https://bugzilla.suse.com/1256821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61731"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61731",
"url": "https://www.suse.com/security/cve/CVE-2025-61731"
},
{
"category": "external",
"summary": "SUSE Bug 1256819 for CVE-2025-61731",
"url": "https://bugzilla.suse.com/1256819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68119"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68119",
"url": "https://www.suse.com/security/cve/CVE-2025-68119"
},
{
"category": "external",
"summary": "SUSE Bug 1256820 for CVE-2025-68119",
"url": "https://bugzilla.suse.com/1256820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68121"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68121",
"url": "https://www.suse.com/security/cve/CVE-2025-68121"
},
{
"category": "external",
"summary": "SUSE Bug 1256818 for CVE-2025-68121",
"url": "https://bugzilla.suse.com/1256818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-doc-1.25.6-150000.1.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.25-openssl-race-1.25.6-150000.1.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-26T16:10:54Z",
"details": "important"
}
],
"title": "CVE-2025-68121"
}
]
}
WID-SEC-W-2026-0129
Vulnerability from csaf_certbund - Published: 2026-01-15 23:00 - Updated: 2026-03-02 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten zu manipulieren oder vertrauliche Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0129 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0129.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0129 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0129"
},
{
"category": "external",
"summary": "Go 1.25.6 and Go 1.24.12 release notes vom 2026-01-15",
"url": "https://seclists.org/oss-sec/2026/q1/68"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77101 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77101"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77102 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77102"
},
{
"category": "external",
"summary": "GitHub Golang Issue 76443 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/76443"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77100 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77100"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77099 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77099"
},
{
"category": "external",
"summary": "GitHub Golang Issue 77113 vom 2026-01-15",
"url": "https://github.com/golang/go/issues/77113"
},
{
"category": "external",
"summary": "CoreDNS-1.14.1 Release Notes vom 2026-01-19",
"url": "https://coredns.io/2026/01/15/coredns-1.14.-release/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10063-1 vom 2026-01-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NH2ETRY5I4475P2G36TA426YNBGAZLJM/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10064-1 vom 2026-01-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJZDHBHKXYC7TOPJZKAU6QZKMN53VSVC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0219-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0218-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0298-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q63UO2LYEIXNPXRBOE6F42PWFVTQ6LQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0297-1 vom 2026-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0296-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0308-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20122-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023968.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10101-1 vom 2026-01-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MQGDE5WRPP6NKEPWSYQ5WAJ54HTZCN45/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20132-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023959.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:0032-1 vom 2026-01-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YIDNEL2XD2C3R7XQHANV23SKGOE6VLD6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0354-1 vom 2026-02-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2026-095 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-095.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3135 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3135.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3134 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3134.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-096 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-096.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3138 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3138.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3137 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3137.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3136 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3136.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3146 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3146.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0403-1 vom 2026-02-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0426-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0427-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2708 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20220-1 vom 2026-02-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4EVFYENISTE7WMVDTI7MTPTDXI7IJQ2/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20214-1 vom 2026-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQX4ETITXJH3KBGH7YHJSZKMZNKVQRWR/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2706 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2754 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2754"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2706 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2706.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2681 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2681"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2709 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2709.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2708 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2708.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2708 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2708"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2709 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2709"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2706 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2706"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3174 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3174.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2026-096 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-096.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20429-1 vom 2026-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20428-1 vom 2026-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-087 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-087.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-088 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-088.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-089 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-089.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-090 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-091 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-091.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-092 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-092.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2920 vom 2026-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2026-2920.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2914 vom 2026-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2026-2914.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10220-1 vom 2026-02-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7N2QLT4QQIZC6RCBGA4LQNAUW5NSKRS/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10224-1 vom 2026-02-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4XIIXIOQEITZJFXXLA5XOCW3MWGG7L/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3035 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3035"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3040 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3040"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3089 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3092 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3092.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3040 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3040.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3035 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3092 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3192 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3192"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3193 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3193"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3188 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3187 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3187"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3184 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3184"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3291 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3092 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:3092"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3298 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3297 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3337 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3187 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3187.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3343 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3336 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3188 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3188.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3297 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3297.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3291 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3291.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3298 vom 2026-02-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-3298.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3336 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3336.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3337 vom 2026-02-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-3337.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3340 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3340 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3340.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3341 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3341.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3343 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3343.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3186 vom 2026-02-26",
"url": "https://access.redhat.com/errata/RHSA-2026:3186"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3341 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3427 vom 2026-02-26",
"url": "https://access.redhat.com/errata/RHSA-2026:3427"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-099 vom 2026-02-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-099.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-102 vom 2026-02-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-102.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-101 vom 2026-02-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-101.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-100 vom 2026-02-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-098 vom 2026-02-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-098.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2DOCKER-2026-097 vom 2026-02-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS2DOCKER-2026-097.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3336 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3336"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3337 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3337"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3459 vom 2026-02-27",
"url": "https://access.redhat.com/errata/RHSA-2026:3459"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3343 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3343"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3341 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3341"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3340 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3340"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3298 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3298"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3297 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3297"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3291 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3291"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3187 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3187"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3188 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3188"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0687-1 vom 2026-02-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3506 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3506"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3473 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3473"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3472 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3472"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3470 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3470"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3469 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3469"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3468 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3468"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3489 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3489"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3556 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3556"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7262283 vom 2026-03-02",
"url": "https://www.ibm.com/support/pages/node/7262283"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3559 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3559"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-02T23:00:00.000+00:00",
"generator": {
"date": "2026-03-03T09:32:52.794+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0129",
"initial_release_date": "2026-01-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE, European Union Vulnerability Database und openSUSE aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon, Go und European Union Vulnerability Database aufgenommen"
},
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat und openSUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Amazon, SUSE und Oracle Linux aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Amazon, Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat und IBM aufgenommen"
}
],
"status": "final",
"version": "22"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.25.6",
"product": {
"name": "Golang Go \u003c1.25.6",
"product_id": "T050049"
}
},
{
"category": "product_version",
"name": "1.25.6",
"product": {
"name": "Golang Go 1.25.6",
"product_id": "T050049-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.24.12",
"product": {
"name": "Golang Go \u003c1.24.12",
"product_id": "T050051"
}
},
{
"category": "product_version",
"name": "1.24.12",
"product": {
"name": "Golang Go 1.24.12",
"product_id": "T050051-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.24.12"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM App Connect Enterprise",
"product": {
"name": "IBM App Connect Enterprise",
"product_id": "T032495",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.14.1",
"product": {
"name": "Open Source CoreDNS \u003c1.14.1",
"product_id": "T050073"
}
},
{
"category": "product_version",
"name": "1.14.1",
"product": {
"name": "Open Source CoreDNS 1.14.1",
"product_id": "T050073-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:coredns:coredns:1.14.1"
}
}
}
],
"category": "product_name",
"name": "CoreDNS"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "distributed tracing platform",
"product": {
"name": "Red Hat OpenShift distributed tracing platform",
"product_id": "T051282",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:distributed_tracing_platform"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61726",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T051282",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255",
"T032495"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61726"
},
{
"cve": "CVE-2025-61728",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T051282",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255",
"T032495"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61728"
},
{
"cve": "CVE-2025-61730",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T051282",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255",
"T032495"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61730"
},
{
"cve": "CVE-2025-61731",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T051282",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255",
"T032495"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-61731"
},
{
"cve": "CVE-2025-68119",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T051282",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255",
"T032495"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-68119"
},
{
"cve": "CVE-2025-68121",
"product_status": {
"known_affected": [
"T050051",
"T050073",
"T051282",
"T002207",
"67646",
"T027843",
"398363",
"T050049",
"T004914",
"T032255",
"T032495"
]
},
"release_date": "2026-01-15T23:00:00.000+00:00",
"title": "CVE-2025-68121"
}
]
}
WID-SEC-W-2026-0345
Vulnerability from csaf_certbund - Published: 2026-02-08 23:00 - Updated: 2026-03-02 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Go ist eine quelloffene Programmiersprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0345 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0345.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0345 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0345"
},
{
"category": "external",
"summary": "Golang Announce vom 2026-02-08",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "OSS Mailing List vom 2026-02-08",
"url": "https://seclists.org/oss-sec/2026/q1/147"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0426-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0427-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2706 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2706"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2708 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2708"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20214-1 vom 2026-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQX4ETITXJH3KBGH7YHJSZKMZNKVQRWR/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20220-1 vom 2026-02-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4EVFYENISTE7WMVDTI7MTPTDXI7IJQ2/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2706 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2706.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2708 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2708.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2709 vom 2026-02-16",
"url": "https://linux.oracle.com/errata/ELSA-2026-2709.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2709 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2709"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2706 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2706"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2708 vom 2026-02-17",
"url": "https://errata.build.resf.org/RLSA-2026:2708"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-091 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-091.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2914 vom 2026-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2026-2914.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2920 vom 2026-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2026-2920.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-090 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2NITRO-ENCLAVES-2026-089 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2NITRO-ENCLAVES-2026-089.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20428-1 vom 2026-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20429-1 vom 2026-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2ECS-2026-096 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2ECS-2026-096.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3172 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3172.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10220-1 vom 2026-02-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7N2QLT4QQIZC6RCBGA4LQNAUW5NSKRS/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10224-1 vom 2026-02-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4XIIXIOQEITZJFXXLA5XOCW3MWGG7L/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3035 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3092 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3092"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3040 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3040.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3092 vom 2026-02-24",
"url": "http://linux.oracle.com/errata/ELSA-2026-3092.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3089 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3089"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3188 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3188"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3187 vom 2026-02-24",
"url": "https://access.redhat.com/errata/RHSA-2026:3187"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3092 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:3092"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3291 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3291"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3297 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3297"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3298 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3298"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3188 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3188.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3336 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3336"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3337 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3337"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3343 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3343"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3187 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3187.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3340 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3340"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3291 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3291.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3297 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3297.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3298 vom 2026-02-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-3298.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3341 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3341"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3341 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3341.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3336 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3336.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3343 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3343.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3337 vom 2026-02-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-3337.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3340 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3340.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3187 vom 2026-02-26",
"url": "https://errata.build.resf.org/RLSA-2026:3187"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3473 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3473"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3506 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3506"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0687-1 vom 2026-02-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3489 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3489"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3472 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3472"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3470 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3470"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3471 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3471"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3469 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3469"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3468 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3468"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3556 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3556"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3559 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3559"
}
],
"source_lang": "en-US",
"title": "Golang Go: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-02T23:00:00.000+00:00",
"generator": {
"date": "2026-03-03T09:32:56.602+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0345",
"initial_release_date": "2026-02-08T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat und openSUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon, Oracle Linux und SUSE aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "12"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.25.7",
"product": {
"name": "Golang Go \u003c1.25.7",
"product_id": "T050609"
}
},
{
"category": "product_version",
"name": "1.25.7",
"product": {
"name": "Golang Go 1.25.7",
"product_id": "T050609-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.25.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.24.13",
"product": {
"name": "Golang Go \u003c1.24.13",
"product_id": "T050610"
}
},
{
"category": "product_version",
"name": "1.24.13",
"product": {
"name": "Golang Go 1.24.13",
"product_id": "T050610-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:golang:go:1.24.13"
}
}
}
],
"category": "product_name",
"name": "Go"
}
],
"category": "vendor",
"name": "Golang"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61732",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T027843",
"398363",
"T050610",
"T004914",
"T032255",
"T050609"
]
},
"release_date": "2026-02-08T23:00:00.000+00:00",
"title": "CVE-2025-61732"
},
{
"cve": "CVE-2025-68121",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T027843",
"398363",
"T050610",
"T004914",
"T032255",
"T050609"
]
},
"release_date": "2026-02-08T23:00:00.000+00:00",
"title": "CVE-2025-68121"
}
]
}
GHSA-H355-32PF-P2XM
Vulnerability from github – Published: 2026-02-05 18:30 – Updated: 2026-02-06 18:30During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
{
"affected": [],
"aliases": [
"CVE-2025-68121"
],
"database_specific": {
"cwe_ids": [
"CWE-295"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-05T18:16:10Z",
"severity": "MODERATE"
},
"details": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"id": "GHSA-h355-32pf-p2xm",
"modified": "2026-02-06T18:30:31Z",
"published": "2026-02-05T18:30:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://go.dev/cl/737700"
},
{
"type": "WEB",
"url": "https://go.dev/issue/77217"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
CERTFR-2026-AVI-0218
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Platform Services pour Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.5 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.12.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.238.x | ||
| VMware | Workstation | Workstation versions antérieures à 25H2u1 | ||
| VMware | Fusion | Fusion versions antérieures à 25H2u1 sur MacOS | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.16.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.95.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.8.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 14.21.0 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.238.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2026-22722",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-25586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2017-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2025-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2026-22715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2022-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2026-22716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2022-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2026-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2023-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-11082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-1149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2021-46174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2022-48065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2022-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2022-35205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-1178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-1176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2025-12119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-34410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-47911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2022-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-33285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-11081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2026-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2022-48063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
},
{
"name": "CVE-2024-53589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2023-32181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2019-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2021-20205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2021-20284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2020-19726",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2023-37369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
},
{
"name": "CVE-2024-48615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2018-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2025-8225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2025-8224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2025-11966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2021-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-5244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
},
{
"name": "CVE-2021-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2022-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-36660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-11839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2021-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
},
{
"name": "CVE-2022-45703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2022-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2026-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2026-22717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2025-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
CERTFR-2026-AVI-0209
Vulnerability from certfr_avis - Published: 2026-02-25 - Updated: 2026-02-25
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour Tanzu versions antérieures à 1.14.11 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour Tanzu Platform versions antérieures à 1.16.17 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.60 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.3.5 et 10.2.8+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Automation Toolkit versions antérieures à 5.4.2 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.80 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour Tanzu Platform versions antérieures à 2.4.2 | ||
| VMware | Tanzu Kubernetes Runtime | Compliance Scanning pour Tanzu Platform versions antérieures à 1.3.29 | ||
| VMware | Tanzu Kubernetes Runtime | Greffon Elastic Application Runtime Windows pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions 1.1065.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour Tanzu Platform versions antérieures à 250.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Application Services pour Tanzu Platform versions antérieures à 3.3.15 | ||
| VMware | Tanzu Kubernetes Runtime | Scheduler pour Tanzu Platform versions antérieures à 2.0.24 | ||
| VMware | Tanzu Kubernetes Runtime | Service Publisher for VMware Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Anti-Virus Scanning pour Tanzu Platform versions antérieures à 2.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions 1.1065.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | File Integrity Monitoring pour Tanzu Platform versions antérieures à 2.1.50 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions 1.1033.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | Metric Store versions antérieures à 1.8.2 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.65 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Spring Cloud Data Flow pour Tanzu versions ant\u00e9rieures \u00e0 1.14.11",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.17",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.60",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.3.5 et 10.2.8+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.4.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.80",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Compliance Scanning pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.3.29",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Greffon Elastic Application Runtime Windows pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions 1.1065.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.6",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Application Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.3.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.24",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Service Publisher for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus Scanning pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions 1.1065.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.1.50",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions 1.1033.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Metric Store versions ant\u00e9rieures \u00e0 1.8.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.65",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-29408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29408"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2026-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21226"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2023-29407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29407"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-41253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41253"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2024-24792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24792"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-69277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69277"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-41727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41727"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-25T00:00:00",
"last_revision_date": "2026-02-25T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0209",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37064",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37064"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37049",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37049"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37075",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37075"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37071",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37071"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37054",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37054"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37069",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37069"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37067",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37067"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37032",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37032"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37028",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37028"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37063",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37063"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37027",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37027"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37059",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37059"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37042",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37042"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37026",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37026"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37060",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37060"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37048",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37048"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37034",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37034"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37065",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37065"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37040",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37040"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37074",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37074"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37057",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37057"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37070",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37070"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37043",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37043"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37037",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37037"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37061",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37061"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37051",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37051"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37053",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37053"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37035",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37035"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37036",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37036"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37041",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37041"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37062",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37062"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37038",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37038"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37055",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37055"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37025",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37025"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37029",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37029"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37045",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37045"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37044",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37044"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37072",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37072"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37046",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37046"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37058",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37058"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37066",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37066"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37068",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37068"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37052",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37052"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37033",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37033"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37073",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37073"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37056",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37056"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37050",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37050"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37030",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37030"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37031",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37031"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37039",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37039"
}
]
}
CERTFR-2026-AVI-0191
Vulnerability from certfr_avis - Published: 2026-02-20 - Updated: 2026-02-20
Une vulnérabilité a été découverte dans Traefik. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Traefik versions v2.x ant\u00e9rieures \u00e0 v2.11.37",
"product": {
"name": "Traefik",
"vendor": {
"name": "Traefik",
"scada": false
}
}
},
{
"description": "Traefik versions v3.x ant\u00e9rieures \u00e0 v3.6.8",
"product": {
"name": "Traefik",
"vendor": {
"name": "Traefik",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
}
],
"initial_release_date": "2026-02-20T00:00:00",
"last_revision_date": "2026-02-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0191",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Traefik. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Traefik",
"vendor_advisories": [
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Traefik GHSA-gv8r-9rw9-9697",
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-gv8r-9rw9-9697"
}
]
}
MSRC_CVE-2025-68121
Vulnerability from csaf_microsoft - Published: 2026-02-02 00:00 - Updated: 2026-03-05 01:09Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-68121 Unexpected session resumption in crypto/tls - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-68121.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Unexpected session resumption in crypto/tls",
"tracking": {
"current_release_date": "2026-03-05T01:09:17.000Z",
"generator": {
"date": "2026-03-05T12:33:53.007Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-68121",
"initial_release_date": "2026-02-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-05T01:09:17.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 golang 1.26.0-1",
"product": {
"name": "azl3 golang 1.26.0-1",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "golang"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.26.0-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68121",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-68121 Unexpected session resumption in crypto/tls - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-68121.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-03-05T01:09:17.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.4,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"17084-1"
]
}
],
"title": "Unexpected session resumption in crypto/tls"
}
]
}
FKIE_CVE-2025-68121
Vulnerability from fkie_nvd - Published: 2026-02-05 18:16 - Updated: 2026-02-20 17:257.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/737700 | Patch | |
| security@golang.org | https://go.dev/issue/77217 | Exploit, Issue Tracking | |
| security@golang.org | https://groups.google.com/g/golang-announce/c/K09ubi9FQFk | Mailing List, Third Party Advisory | |
| security@golang.org | https://pkg.go.dev/vuln/GO-2026-4337 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEE539A-EDC2-4044-A38C-5A0FDF567509",
"versionEndExcluding": "1.24.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B275853C-E253-485B-B469-31D1A7383965",
"versionEndExcluding": "1.25.7",
"versionStartIncluding": "1.25.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:1.26.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E529A0EC-B944-4E2F-B26A-2A9F31AFF240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:golang:go:1.26.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "553D6D90-140E-4A54-86A3-00E66AC30F3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake."
},
{
"lang": "es",
"value": "Durante la reanudaci\u00f3n de la sesi\u00f3n en crypto/tls, si la Config subyacente tiene sus campos ClientCAs o RootCAs mutados entre el handshake inicial y el handshake reanudado, el handshake reanudado puede tener \u00e9xito cuando deber\u00eda haber fallado. Esto puede ocurrir cuando un usuario llama a Config.Clone y muta la Config devuelta, o usa Config.GetConfigForClient. Esto puede hacer que un cliente reanude una sesi\u00f3n con un servidor con el que no la habr\u00eda reanudado durante el handshake inicial, o hacer que un servidor reanude una sesi\u00f3n con un cliente con el que no la habr\u00eda reanudado durante el handshake inicial."
}
],
"id": "CVE-2025-68121",
"lastModified": "2026-02-20T17:25:50.303",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-02-05T18:16:10.857",
"references": [
{
"source": "security@golang.org",
"tags": [
"Patch"
],
"url": "https://go.dev/cl/737700"
},
{
"source": "security@golang.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://go.dev/issue/77217"
},
{
"source": "security@golang.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
],
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
bit-golang-2025-68121
Vulnerability from bitnami_vulndb
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "golang",
"purl": "pkg:bitnami/golang"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.13"
},
{
"introduced": "1.25.0-0"
},
{
"fixed": "1.25.7"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-68121"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
],
"severity": "Critical"
},
"details": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
"id": "BIT-golang-2025-68121",
"modified": "2026-02-11T09:09:18.507Z",
"published": "2026-02-10T10:05:16.474Z",
"references": [
{
"type": "WEB",
"url": "https://go.dev/cl/737700"
},
{
"type": "WEB",
"url": "https://go.dev/issue/77217"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2026-4337"
}
],
"schema_version": "1.6.2",
"summary": "Unexpected session resumption in crypto/tls"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.